Index: openafs/doc/html/index.htm diff -c openafs/doc/html/index.htm:1.3 openafs/doc/html/index.htm:1.3.8.1 *** openafs/doc/html/index.htm:1.3 Tue Oct 23 11:26:00 2001 --- openafs/doc/html/index.htm Sat Jun 28 02:41:28 2008 *************** *** 24,30 ****
Included:
Version 3.6 -
Document Number GC09-4562-00 -
-
-
First Edition (April 2000) -
This edition applies to: -
and to all subsequent releases and modifications until otherwise indicated - in new editions. -
This softcopy version is based on the printed edition of this book. - Some formatting amendments have been made to make this information more - suitable for softcopy. -
Order publications through your IBM representative or through the IBM - branch office serving your locality. -
-
- -
-
Tables
-
Index
-
-
- -
-
-
- -
-
-
This chapter describes the purpose, organization, and conventions of this - document. -
- -
-
This reference manual details the syntax of each - AFS(R) command and is intended for the experienced AFS - administrator, programmer, or user. -
In general, this document does not explain when to use a command or its - place in the sequence of commands that make up a complete procedure. - For that type of information, refer to the IBM AFS Administration - Guide. -
- -
-
This document presents AFS files and commands in separate - sections, with the files or commands in alphabetical order. -
The following sections of each reference page provide the indicated type of - information: -
- -
-
Refer to this document when you need detailed information - about a specific command. For a description of all the steps in a - procedure, refer to the IBM AFS Administration Guide. -
- -
-
The following documents are included in the AFS documentation - set. -
IBM AFS Administration Guide -
This guide describes the concepts and procedures that a system - administrator must know to manage an AFS cell. It assumes familiarity - with UNIX, but requires no previous knowledge of AFS. -
The first chapters of the IBM AFS Administration Guide present - basic concepts and guidelines. Understanding them is crucial to - successful administration of an AFS cell. The remaining chapters in the - guide provide step-by-step instructions for specific administrative tasks, - along with discussions of the concepts important to that particular - task. -
IBM AFS Quick Beginnings -
This guide provides instructions for installing AFS server and client - machines. It is assumed that the installer is an experienced UNIX - (R) system administrator. -
For predictable performance, machines must be installed and configured in - accordance with the instructions in this guide. -
IBM AFS Release Notes -
This document provides information specific to each release of AFS, such as - a list of new features and commands, a list of requirements and limitations, - and instructions for upgrading server and client machines. -
IBM AFS User Guide -
This guide presents the basic concepts and procedures necessary for using - AFS effectively. It assumes that the reader has some experience with - UNIX, but does not require familiarity with networking or AFS. -
The guide explains how to perform basic functions, including - authenticating, changing a password, protecting AFS data, creating groups, and - troubleshooting. It provides illustrative examples for each function - and describes some of the differences between the UNIX file system and - AFS. -
- -
-
This document uses the following typographical - conventions: -
In addition, the following symbols appear in command syntax definitions, - both in the documentation and in AFS online help statements. When - issuing a command, do not type these symbols. -
- -
-
-
- -
-
-
Purpose -
Introduction to AFS files -
Description -
A number of files must reside on the local disk of AFS server and client - machines. They belong to the following general categories: -
For a description of the format and contents of each file, see its - reference page. -
Note for Windows users: Some files described in this - document possibly do not exist on machines that run a Windows operating - system. Also, Windows uses a backslash - ( \ ) rather than a forward slash - ( / ) to separate the elements in a - pathname. -
Related Information -
- -Vn -
Controller files: -
NoAuth -
Volume header files: -
-
- -
-
-
Traces Authentication Server operations -
Description -
The AuthLog file records a trace of Authentication Server - (kaserver process) operations on the local machine and describes - any error conditions it encounters. -
If the AuthLog file does not exist in the - /usr/afs/logs directory when the Authentication Server starts, the - server process creates it and writes initial start-up messages to it. - If there is an existing file, the Authentication Server renames it to - AuthLog.old, overwriting the existing - AuthLog.old file if it exists. -
The file is in ASCII format. Administrators listed in the - /usr/afs/etc/UserList file can use the bos getlog - command to display its contents. Alternatively, log onto the server - machine and use a text editor or a file display command such as the UNIX - cat command. By default, the mode bits on the - AuthLog file grant the required r (read) - permission to all users. -
The Authentication Server records operations only as it completes them, and - cannot recover from failures by reviewing the file. The log contents - are useful for administrative evaluation of process failures and other - problems. -
Related Information -
UserList -
kaserver -
-
- -
-
-
Records privileged operations performed by the Authentication Server -
Description -
The AuthLog.dir and AuthLog.pag files - record a trace of privileged operations performed by the Authentication Server - (kaserver process) on the local machine. If the files do not - exist when the Authentication Server starts, it creates them in the - /usr/afs/logs directory as necessary. -
The files are in binary format. To display their contents, use the - kdb command, which requires being logged in to the local machine as - the local superuser root. -
Cautions -
The Authentication Server is possibly unable to create these files on some - operating systems that AFS otherwise supports, making the kdb - command inoperative. See the IBM AFS Release Notes for - details. -
Related Information -
kaserver -
kdb -
-
- -
-
-
Traces Backup Server operations -
Description -
The BackupLog file records a trace of Backup Server - (buserver process) operations on the local machine and describes - any error conditions it encounters. -
If the BackupLog file does not already exist in the - /usr/afs/logs directory when the Backup Server starts, the server - process creates it and writes initial start-up messages to it. If there - is an existing file, the Backup Server renames it to - BackupLog.old, overwriting the existing - BackupLog.old file if it exists. -
The file is in ASCII format. Administrators listed in the - /usr/afs/etc/UserList file can use the bos getlog - command to display its contents. Alternatively, log on to the machine - and use a text editor or a file display command such as the UNIX - cat command. By default, the mode bits on the - BackupLog file grant the required r (read) - permission to all users. -
The Backup Server records operations only as it completes them, and so - cannot recover from failures by reviewing the file. The log contents - are useful for administrative evaluation of process failures and other - problems. -
Related Information -
UserList -
buserver -
-
- -
-
-
Traces BOS Server operations -
Description -
The BosLog file records a trace of Basic OverSeer (BOS) Server - (bosserver process) operations on the local machine and describes - any error conditions it encounters. -
If the BosLog file does not already exist in the - /usr/afs/logs directory when the BOS Server starts, the server - process creates it and writes initial start-up messages to it. If there - is an existing file, the BOS server renames it to - BosLog.old, overwriting the existing - BosLog.old file if it exists. -
The file is in ASCII format. Administrators listed in the - /usr/afs/etc/UserList file can use the bos getlog - command to display its contents. Alternatively, log onto the server - machine and use a text editor or a file display command such as the UNIX - cat command. By default, the mode bits on the - BosLog file grant the required r (read) - permission to all users. -
The BOS Server records operations only as it completes them, and cannot - recover from failures by reviewing the file. The log contents are - useful for administrative evaluation of process failures and other - problems. -
Related Information -
UserList -
-
- -
-
-
Defines server processes for the BOS Server to monitor -
Description -
The BosConfig file lists the processes that the Basic OverSeer - (BOS) Server monitors on its server machine, and thus defines which AFS server - processes run on the machine. It specifies how the BOS Server reacts - when a process fails, and also defines the times at which the BOS Server - automatically restarts processes as part of performance maintenance. - The file must reside in the /usr/afs/local directory on each AFS - server machine. -
A server process entry in the BosConfig file records the - following information: -
There is only one standard entry of this type, for which the conventional - name is fs. It combines three server processes: the - File Server (fileserver process), the Volume Server - (volserver process), and the Salvager (salvager - process). These processes all operate on the same data--the AFS - data stored on an AFS server machine's /vicep partitions and - mounted in the AFS filespace--but in different ways. Grouping the - processes prevents them from attempting to access the same data - simultaneously, which can cause corruption. -
During normal operation, the Salvager process is not active. If the - File Server process fails, however, the BOS Server stops the Volume Server - process and runs the Salvager process to correct any corruption that resulted - from the failure. (The administrator can also issue the bos - salvage command to invoke the Salvager process.) If the Volume - Server fails, the BOS Server can restart it without stopping the File Server - or running the Salvager. -
In addition to server process entries, the BosConfig file - specifies the times at which the BOS Server performs two types of automatic - process restarts: -
Although the BosConfig file is in ASCII format, do not use a - text editor to alter it. Its format is subject to change and - incorrectly formatted entries can prevent server startup in ways that are - difficult to diagnose. Instead always use the appropriate commands from - the bos command suite: -
There are also bos commands that start and stop processes - without changing entries in the BosConfig file. The BOS - Server reads the BosConfig file only when it starts, transferring - the information into its memory. Thus a process's status as - represented in the BOS Server's memory can diverge from its status in the - BosConfig file. The following commands change a - process's status in the BOS Server's memory only: - - - -
Related Information -
bos stop -
salvager -
-
- -
-
-
Records information about each Vn file in a disk cache -
Description -
The CacheItems file records information about each file in the - disk cache on a client machine (each Vn file). The - information includes the file ID number and associated volume version number - of the AFS file currently stored in the Vn file, which - enables the Cache Manager to determine which Vn file - contains the AFS data it needs to present to an application. -
As it initializes, the Cache Manager creates the binary-format - CacheItems file in the same local disk cache directory as the - Vn files that the CacheItems file describes, - and it must always remain there. The conventional directory name is - /usr/vice/cache, but it is acceptable to use a directory on a - partition with more available space. -
Cautions -
Editing or removing the CacheItems file can cause a kernel - panic. If the contents of Vn files seem out of - date, clear the files by using the fs flush or fs - flushvolume command. If the CacheItems file is - accidentally modified or deleted, rebooting the machine usually restores - normal performance. -
Related Information -
Vn -
afsd -
fs flush -
-
- -
-
-
Defines Tape Coordinator configuration instructions for automated tape - devices -
Description -
The CFG_device_name file includes instructions that - configure a Tape Coordinator for use with automated backup devices such as - tape stackers and jukeboxes, enable the Tape Coordinator to dump and restore - data to a backup data file on a local disk device, and enable - greater automation of other aspects of the backup process. -
There is a separate configuration file for each tape device or backup data - file. Creating the file is optional, and unnecessary if none of the - instructions it can include pertain to a given tape device. The - ASCII-format file must reside in the /usr/afs/backup directory on - the Tape Coordinator machine if it exists. -
The CFG_device_name file does not replace the - /usr/afs/backup/tapeconfig file, a single copy of which still must - exist on every Tape Coordinator machine. -
To enable the Tape Coordinator to locate the configuration file, construct - the variable part of the filename, device_name, as follows: -
The CFG_device_name file lists one or more of the - following instructions, each on its own line. All are optional, and - they can appear in any order. A more detailed description of each - instruction follows the list: -
The ASK Instruction -
The ASK instruction takes a boolean value as its argument, in - the following format: -
ASK {YES | NO} - --
When the value is YES, the Tape Coordinator generates a prompt - in its window, requesting a response to the error cases described in the - following list. This is the default behavior if the ASK instruction - does not appear in the CFG_device_name file. -
When the value is NO, the Tape Coordinator does not prompt in - error cases, but instead uses the automatic default responses described in the - following list. The Tape Coordinator also logs the error in the - TE_device_name file. Suppressing the prompts - enables the Tape Coordinator to run unattended, though it still prompts for - insertion of tapes unless the MOUNT instruction is used. -
The error cases controlled by this instruction are the following: -
The AUTOQUERY Instruction -
The AUTOQUERY instruction takes a boolean value as its argument, - in the following format: -
AUTOQUERY {YES | NO} - --
When the value is YES, the Tape Coordinator checks for the - MOUNT instruction in the configuration file when it needs to read - the first tape involved in an operation. As described for that - instruction, it then either prompts for the tape or invokes the specified - routine to mount the tape. This is the default behavior if the - AUTOQUERY instruction does not appear in the configuration - file. -
When the value is NO, the Tape Coordinator assumes that the - first tape required for an operation is already in the drive. It does - not prompt the operator or invoke the MOUNT routine unless there is - an error in accessing the first tape. This setting is equivalent in - effect to including the -noautoquery flag to the butc - command. -
Note that the setting of the AUTOQUERY instruction controls the - Tape Coordinator's behavior only with respect to the first tape required - for an operation. For subsequent tapes, the Tape Coordinator always - checks for the MOUNT instruction. It also refers to the - MOUNT instruction if it encounters an error while attempting to - access the first tape. - -
The BUFFERSIZE Instruction -
The BUFFERSIZE instruction takes an integer value, and - optionally units, in the following format: -
BUFFERSIZE size[{k | K | m | M | g | G}] - --
where size specifies the amount of memory the Tape Coordinator - allocates to use as a buffer during both dump and restore operations. - The default unit is bytes, but use k or K to specify - kilobytes, m or M for megabytes, and g or - G for gigabytes. There is no space between the - sizevalue and the units letter. -
By default, the Tape Coordinator uses a 16 KB buffer during dump - operations. As it receives volume data from the Volume Server, the Tape - Coordinator gathers 16 KB of data in the buffer before transferring the entire - 16 KB to the tape device or backup data file. Similarly, during a - restore operation the Tape Coordinator by default buffers 32 KB of data from - the tape device or backup data file before transferring the entire 32 KB to - the Volume Server for restoration into the file system. Buffering makes - the volume of data flowing to and from a tape device more even and so promotes - tape streaming, which is the most efficient way for a tape device to - operate. -
In a normal network configuration, the default buffer sizes are usually - large enough to promote tape streaming. If the network between the Tape - Coordinator machine and file server machines is slow, it can help to increase - the buffer size. - -
The FILE Instruction -
The FILE instruction takes a boolean value as its argument, in - the following format: -
FILE {NO | YES} - --
When the value is NO, the Tape Coordinator writes to a tape - device during a dump operation and reads from one during a restore - operation. This is the default behavior if the FILE - instruction does not appear in the configuration file. -
When the value is YES, the Tape Coordinator writes volume data - to a backup data file on the local disk during a dump operation and reads - volume data from a file during a restore operation. If the file does - not exist when the Tape Coordinator attempts to access it to write a dump, the - Tape Coordinator creates it. For a restore operation to succeed, the - file must exist and contain volume data previously written to it by a - backup dump operation. -
When the value is YES, the backup data file's complete - pathname must appear (instead of a tape drive device name) in the third field - of the corresponding port offset entry in the local - /usr/afs/backup/tapeconfig file. If the field instead refers - to a tape device, dump operations appear to succeed but are - inoperative. It is not possible to restore data that was accidently - dumped to a tape device while the FILE instruction was set to - YES. (In the same way, if the FILE instruction is - set to NO, the tapeconfig entry must refer to an actual - tape device.) -
Rather than put an actual file pathname in the third field of the - tapeconfig file, however, the recommended configuration is to - create a symbolic link in the /dev directory that points to the - actual file pathname, and record the symbolic link in this field. This - configuration has a couple of advantages: -
If the third field in the tapeconfig file names the actual file, - there is no way to recover from exhausting the space on the partition that - houses the backup data file. It is not possible to change the - tapeconfig file in the middle of an operation. -
When writing to a backup data file, the Tape Coordinator writes data at 16 - KB offsets. If a given block of data (such as the marker that signals - the beginning or end of a volume) does not fill the entire 16 KB, the Tape - Coordinator still skips to the next offset before writing the next - block. In the output of a backup dumpinfo command issued - with the -id option, the value in the Pos column is the - ordinal of the 16-KB offset at which the volume data begins, and so is not - generally only one higher than the position number on the previous line, as it - is for dumps to tape. - -
The MOUNT Instruction -
The MOUNT instruction takes a pathname as its argument, in the - following format: -
- MOUNT filename - --
The referenced executable file must reside on the local disk and contain a - shell script or program that directs an automated tape device, such as a - jukebox or stacker, to mount a tape (insert it into the tape reader). - The operator must write the routine to invoke the mount command specified by - the device's manufacturer; AFS does not include any scripts, - although an example appears in the following Examples - section. The script or program inherits the Tape Coordinator's AFS - authentication status. -
When the Tape Coordinator needs to mount a tape, it checks the - configuration file for a MOUNT instruction. If there is no - MOUNT instruction, the Tape Coordinator prompts the operator to - insert a tape before it attempts to open the tape device. If there is a - MOUNT instruction, the Tape Coordinator executes the routine in the - referenced file. The routine invoked by the MOUNT - instruction inherits the local identity (UNIX UID) and AFS tokens of the - butc command's issuer. -
There is an exception to this sequence: if the AUTOQUERY - NO instruction appears in the configuration file, or the - -noautoquery flag was included on the butc command, then - the Tape Coordinator assumes that the operator has already inserted the first - tape needed for a given operation. It attempts to read the tape - immediately, and only checks for the MOUNT instruction or prompts - the operator if the tape is missing or is not the required one. -
When the Tape Coordinator invokes the routine indicated by the - MOUNT instruction, it passes the following parameters to the - routine in the indicated order: -
The routine invoked by the MOUNT instruction must return an exit - code to the Tape Coordinator: -
If the backup command was issued in interactive mode and the - operator issues the (backup) kill command while the - MOUNT routine is running, the Tape Coordinator passes the - termination signal to the routine; the entire operation - terminates. - -
The NAME_CHECK Instruction -
The NAME_CHECK instruction takes a boolean value as its - argument, in the following format: -
NAME_CHECK {YES | NO} - --
When the value is YES and the tape does not have a permanent - name, the Tape Coordinator checks the AFS tape name when dumping a volume in - response to the backup dump command. The AFS tape name must - be <NULL> or match the tape name that the backup dump - operation assigns based on the volume set and dump level names. This is - the default behavior if the NAME_CHECK instruction does not appear - in the configuration file. -
When the value is NO, the Tape Coordinator does not check the - AFS tape name before writing to the tape. -
The Tape Coordinator always checks that all dumps on the tape are expired, - and refuses to write to a tape that contains unexpired dumps. - -
The UNMOUNT Instruction -
The UNMOUNT instruction takes a pathname as its argument, in the - following format: -
UNMOUNT filename - --
The referenced executable file must reside on the local disk and contain a - shell script or program that directs an automated tape device, such as a - jukebox or stacker, to unmount a tape (remove it from the tape reader). - The operator must write the routine to invoke the unmount command specified by - the device's manufacturer; AFS does not include any scripts, - although an example appears in the following Examples - section. The script or program inherits the Tape Coordinator's AFS - authentication status. -
After closing a tape device, the Tape Coordinator checks the configuration - file for an UNMOUNT instruction, whether or not the - close operation succeeds. If there is no UNMOUNT - instruction, the Tape Coordinator takes no action, in which case the operator - must take the action necessary to remove the current tape from the drive - before another can be inserted. If there is an UNMOUNT - instruction, the Tape Coordinator executes the referenced file. It - invokes the routine only once, passing in the following parameters: -
Privilege Required -
The file is protected by UNIX mode bits. Creating the file requires - the w (write) and x (execute) - permissions on the /usr/afs/backup directory. Editing the - file requires the w (write) permission on the - file. -
Examples -
The following example configuration files demonstrate one way to structure - a configuration file for a stacker or backup dump file. The examples - are not necessarily appropriate for a specific cell; if using them as - models, be sure to adapt them to the cell's needs and equipment. -
Example CFG_device_name File for - Stackers -
In this example, the administrator creates the following entry for a tape - stacker called stacker0.1 in the - /usr/afs/backup/tapeconfig file. It has port offset - 0. -
2G 5K /dev/stacker0.1 0 - --
The administrator includes the following five lines in the - /usr/afs/backup/CFG_stacker0.1 file. To review the - meaning of each instruction, see the preceding Description - section. -
MOUNT /usr/afs/backup/stacker0.1 - UNMOUNT /usr/afs/backup/stacker0.1 - AUTOQUERY NO - ASK NO - NAME_CHECK NO - --
Finally, the administrator writes the following executable routine in the - /usr/afs/backup/stacker0.1 file referenced by the - MOUNT and UNMOUNT instructions in the - CFG_stacker0.1 file. -
#! /bin/csh -f - - set devicefile = $1 - set operation = $2 - set tries = $3 - set tapename = $4 - set tapeid = $5 - - set exit_continue = 0 - set exit_abort = 1 - set exit_interactive = 2 - - #-------------------------------------------- - - if (${tries} > 1) then - echo "Too many tries" - exit ${exit_interactive} - endif - - if (${operation} == "unmount") then - echo "UnMount: Will leave tape in drive" - exit ${exit_continue} - endif - - if ((${operation} == "dump") |\ - (${operation} == "appenddump") |\ - (${operation} == "savedb")) then - - stackerCmd_NextTape ${devicefile} - if (${status} != 0)exit${exit_interactive} - echo "Will continue" - exit ${exit_continue} - endif - - if ((${operation} == "labeltape") |\ - (${operation} == "readlabel")) then - echo "Will continue" - exit ${exit_continue} - endif - - echo "Prompt for tape" - exit ${exit_interactive} - --
This routine uses two of the parameters passed to it by the Backup - System: tries and operation. It follows the - recommended practice of prompting for a tape if the value of the - tries parameter exceeds one, because that implies that the stacker - is out of tapes. -
For a backup dump or backup savedb operation, the - routine calls the example stackerCmd_NextTape function provided by - the stacker's manufacturer. Note that the final lines in the file - return the exit code that prompts the operator to insert a tape; these - lines are invoked when either the stacker cannot load a tape or a the - operation being performed is not one of those explicitly mentioned in the file - (such as a restore operation). -
Example CFG_device_name File for Dumping to a - Backup Data File -
In this example, the administrator creates the following entry for a backup - data file called HSM_device in the - /usr/afs/backup/tapeconfig file. It has port offset - 20. -
1G 0K /dev/HSM_device 20 - --
The administrator includes the following lines in the - /usr/afs/backup/CFG_HSM_device file. To review the meaning - of each instruction, see the preceding Description section. -
MOUNT /usr/afs/backup/file - FILE YES - ASK NO - --
Finally, the administrator writes the following executable routine in the - /usr/afs/backup/file file referenced by the MOUNT - instruction in the CFG_HSM_device file, to control how the Tape - Coordinator handles the file. -
#! /bin/csh -f - set devicefile = $1 - set operation = $2 - set tries = $3 - set tapename = $4 - set tapeid = $5 - - set exit_continue = 0 - set exit_abort = 1 - set exit_interactive = 2 - - #-------------------------------------------- - - if (${tries} > 1) then - echo "Too many tries" - exit ${exit_interactive} - endif - - if (${operation} == "labeltape") then - echo "Won't label a tape/file" - exit ${exit_abort} - endif - - if ((${operation} == "dump") |\ - (${operation} == "appenddump") |\ - (${operation} == "restore") |\ - (${operation} == "savedb") |\ - (${operation} == "restoredb")) then - - /bin/rm -f ${devicefile} - /bin/ln -s /hsm/${tapename}_${tapeid} ${devicefile} - if (${status} != 0) exit ${exit_abort} - endif - - exit ${exit_continue} - --
Like the example routine for a tape stacker, this routine uses the - tries and operation parameters passed to it by the - Backup System. The tries parameter tracks how many times the - Tape Coordinator has attempted to access the file. A value greater than - one indicates that the Tape Coordinator cannot access it, and the routine - returns exit code 2 (exit_interactive), which results in a prompt - for the operator to load a tape. The operator can use this opportunity - to change the name of the backup data file specified in the - tapeconfig file. -
The primary function of this routine is to establish a link between the - device file and the file to be dumped or restored. When the Tape - Coordinator is executing a backup dump, backup restore, - backup savedb, or backup restoredb operation, the - routine invokes the UNIX ln -s command to create a symbolic link - from the backup data file named in the tapeconfig file to the - actual file to use (this is the recommended method). It uses the value - of the tapename and tapeid parameters to construct the - file name. -
Related Information -
-
- -
-
-
Lists the database server machines in all cells accessible from the machine -
Description -
The client version of the CellServDB file lists the database - server machines in the local cell and any foreign cell that is to be - accessible from the local client machine. Database server machines run - the Authentication Server, Backup Server, Protection Server, and Volume - Location (VL) Server (the kaserver, buserver, - ptserver, and vlserver) processes, which maintain the - cell's administrative AFS databases. -
The Cache Manager and other processes running on a client machine use the - list of a cell's database server machines when performing several common - functions, including: -
The Cache Manager reads the CellServDB file into kernel memory - as it initializes, and not again until the machine next reboots. To - enable users on the local machine to continue accessing the cell correctly, - update the file whenever a database server machine is added to or removed from - a cell. To update the kernel-resident list of database server machines - without rebooting, use the fs newcell command. -
The CellServDB file is in ASCII format and must reside in the - /usr/vice/etc directory on each AFS client machine. Use a - text editor to create and maintain it. Each cell's entry must have - the following format: -
No extra blank lines or newline characters are allowed in the file, even - after the last entry. Their presence can prevent the Cache Manager from - reading the file into kernel memory, resulting in an error message. -
The AFS Product Support group maintains a list of the database server - machines in all cells that have registered themselves as receptive to access - from foreign cells. When a cell's administrators change its - database server machines, it is customary to register the change with the AFS - Product Support group for inclusion in this file. The file conforms to - the required CellServDB format, and so is a suitable basis for the - CellServDB file on a client machine. Contact the AFS Product - Support group for directions on accessing the file. -
The client version of the CellServDB file is distinct from the - server version, which resides in the /usr/afs/etc directory on each - AFS server machine. The client version lists the database server - machines in every AFS cell that the cell administrator wants the - machine's users to be able to access, whereas the server version lists - only the local cell's database server machines. -
Examples -
The following example shows entries for two cells in a client - CellServDB file and illustrates the required format. -
>abc.com # ABC Corporation - 192.12.105.2 #db1.abc.com - 192.12.105.3 #db2.abc.com - 192.12.107.3 #db3.abc.com - >test.abc.com # ABC Corporation Test Cell - 192.12.108.57 #testdb1.abc.com - 192.12.108.55 #testdb2.abc.com - --
Related Information -
klog -
-
- -
-
-
Lists the local cell's database server machines -
Description -
The server version of the CellServDB file lists the local - cell's database server machines. These machines run the - Authentication Server, Backup Server, Protection Server, and Volume Location - (VL) Server (the kaserver, buserver, - ptserver, and vlserver) processes, which maintain the - cell's administrative AFS databases. The initial version of the - file is created with the bos setcellname command during the - installation of the cell's server machine, which is automatically - recorded as the cell's first database server machine. When adding - or removing database server machines, be sure to update this file - appropriately. It must reside in the /usr/afs/etc directory - on each AFS server machine. -
The database server processes consult the CellServDB file to - learn about their peers, with which they must maintain constant connections in - order to coordinate replication of changes across the multiple copies of each - database. The other AFS server processes consult the file to learn - which machines to contact for information from the databases when they need - it. -
Although the CellServDB file is in ASCII format, do not use a - text editor to alter it. Instead always use the appropriate commands - from the bos command suite: -
In cells that run the United States edition of AFS and use the Update - Server to distribute the contents of the /usr/afs/etc directory, it - is customary to edit only the copy of the file stored on the system control - machine. In cells that run the international version of AFS, edit the - file on each server machine individually. For instructions on adding - and removing database server machine, see the IBM AFS Quick - Beginnings chapter on installing additional server machines. -
The server version of the CellServDB file is distinct from the - client version, which resides in the /usr/vice/etc directory on - each AFS client machine. The server version lists only the local - cell's database server machines, whereas the client version lists the - database server machines in every AFS cell that the cell administrator wants - the machine's users to be able to access. -
Related Information -
buserver -
kaserver -
ptserver -
vlserver -
upclient -
upserver -
IBM AFS Quick Beginnings -
-
- -
-
-
Traces File Server operations -
Description -
The FileLog file records a trace of File Server - (fileserver process) operations on the local machine and describes - any error conditions it encounters. -
If the FileLog file does not already exist in the - /usr/afs/logs directory when the File Server starts, the server - process creates it and writes initial start-up messages to it. If there - is an existing file, the File Server renames it to - FileLog.old, overwriting the existing - FileLog.old file if it exists. -
The file is in ASCII format. Administrators listed in the - /usr/afs/etc/UserList file can use the bos getlog - command to display its contents. Alternatively, log onto the file - server machine and use a text editor or a file display command such as the - UNIX cat command. By default, the mode bits on the - FileLog file grant the required r (read) - permission to all users. -
The File Server records operations only as it completes them, and cannot - recover from failures by reviewing the file. The log contents are - useful for administrative evaluation of process failures and other - problems. -
Related Information -
UserList -
-
- -
-
-
Forces salvage of entire partition -
Description -
The FORCESALVAGE file, if present on an AFS server partition - (that is, in a /vicep directory), signals that the Salvager must - salvage the entire partition. The AFS-modified version of the - fsck program creates the empty (zero-length) file when it discovers - corruption on the partition. The Salvager removes the file when it - completes the salvage operation. -
When the File Server detects the presence of the file on a partition on - which it is attaching volumes, it stops, detaches any volumes that are already - attached, and exits after recording a message in the - /usr/afs/logs/FileLog file. The Bos Server then invokes the - Salvager to salvage the partition. -
Related Information -
FileLog -
salvager -
-
- -
-
-
Defines AFS server encryption keys -
Description -
The KeyFile file defines the server encryption keys that the AFS - server processes running on the machine use to decrypt the tickets presented - by clients during the mutual authentication process. AFS server - processes perform privileged actions only for clients that possess a ticket - encrypted with one of the keys from the file. The file must reside in - the /usr/afs/etc directory on every server machine. For more - detailed information on mutual authentication and server encryption keys, see - the IBM AFS Administration Guide. -
Each key has a corresponding a key version number that distinguishes it - from the other keys. The tickets that clients present are also marked - with a key version number to tell the server process which key to use to - decrypt it. The KeyFile file must always include a key with - the same key version number and contents as the key currently listed for the - afs entry in the Authentication Database. -
The KeyFile file is in binary format, so always use the - appropriate commands from the bos command suite to administer - it: -
In cells that run the United States edition of AFS and use the Update - Server to distribute the contents of the /usr/afs/etc directory, it - is customary to edit only the copy of the file stored on the system control - machine. In cells that run the international version of AFS, edit the - file on each server machine individually. -
Related Information -
upclient -
upserver -
IBM AFS Administration Guide -
-
- -
-
-
Defines client machine interfaces to register with the File Server -
Description -
The NetInfo file lists the IP addresses of one or more of the - local machine's network interfaces. If it exists in the - /usr/vice/etc directory when the Cache Manager initializes, the - Cache Manager uses its contents as the basis for a list of local - interfaces. Otherwise, the Cache Manager uses the list of interfaces - configured with the operating system. It then removes from the list any - addresses that appear in the /usr/vice/etc/NetRestrict file, if it - exists. The Cache Manager records the resulting list in kernel - memory. The first time it establishes a connection to a File Server, it - registers the list with the File Server. -
The File Server uses the addresses when it initiates a remote procedure - call (RPC) to the Cache Manager (as opposed to responding to an RPC sent by - the Cache Manager). There are two common circumstances in which the - File Server initiates RPCs: when it breaks callbacks and when it pings - the client machine to verify that the Cache Manager is still - accessible. -
The NetInfo file is in ASCII format. One of the - machine's IP addresses appears on each line, in dotted decimal - format. The File Server initially uses the address that appears first - in the list. The order of the remaining addresses is not - significant: if an RPC to the first interface fails, the File Server - simultaneously sends RPCs to all of the other interfaces in the list. - Whichever interface replies first is the one to which the File Server then - sends pings and RPCs to break callbacks. -
To prohibit the Cache Manager absolutely from using one or more addresses, - list them in the NetRestrict file. To display the addresses - the Cache Manager is currently registering with File Servers, use the fs - getclientaddrs command. To replace the current list of interfaces - with a new one between reboots of the client machine, use the fs - setclientaddrs command. -
Related Information -
NetRestrict (client version) -
-
- -
-
-
Defines interfaces that File Server registers in VLDB and Ubik uses for - database server machines -
Description -
The NetInfo file, if present in the /usr/afs/local - directory, defines the following: -
If the NetInfo file exists when the File Server initializes, the - File Server uses its contents as the basis for a list of interfaces to - register in the VLDB. Otherwise, it uses the list of network interfaces - configured with the operating system. It then removes from the list any - addresses that appear in the /usr/vice/etc/NetRestrict file, if it - exists. The File Server records the resulting list in the - /usr/afs/local/sysid file and registers the interfaces in the - VLDB. The database server processes use a similar procedure when - initializing, to determine which interfaces to use for communication with the - peer processes on other database machines in the cell. -
The NetInfo file is in ASCII format. One of the - machine's IP addresses appears on each line, in dotted decimal - format. The order of the addresses is not significant. -
To display the File Server interface addresses registered in the VLDB, use - the vos listaddrs command. -
Related Information -
NetRestrict (server version) -
sysid -
-
- -
-
-
Defines client interfaces not to register with the File Server -
Description -
The NetRestrict file, if present in a client machine's - /usr/vice/etc directory, defines the IP addresses of the interfaces - that the local Cache Manager does not register with a File Server when first - establishing a connection to it. For an explanation of how the File - Server uses the registered interfaces, see the reference page for the client - version of the NetInfo file. -
As it initializes, the Cache Manager constructs a list of interfaces to - register, from the /usr/vice/etc/NetInfo file if it exists, or from - the list of interfaces configured with the operating system otherwise. - The Cache Manager then removes from the list any addresses that appear in the - NetRestrict file, if it exists. The Cache Manager records - the resulting list in kernel memory. -
The NetRestrict file is in ASCII format. One IP address - appears on each line, in dotted decimal format. The order of the - addresses is not significant. The value 255 is a wildcard - that represents all possible addresses in that field. For example, the - value 192.12.105.255 indicates that the Cache - Manager does not register any of the addresses in the - 192.12.105 subnet. -
To display the addresses the Cache Manager is currently registering with - File Servers, use the fs getclientaddrs command. -
Related Information -
-
- -
-
-
Defines interfaces that File Server does not register in VLDB and Ubik does - not use for database server machines -
Description -
The NetRestrict file, if present in the - /usr/afs/local directory, defines the following: -
As it initializes, the File Server constructs a list of interfaces to - register, from the /usr/afs/local/NetInfo file if it exists, or - from the list of interfaces configured with the operating system - otherwise. The File Server then removes from the list any addresses - that appear in the NetRestrict file, if it exists. The File - Server records the resulting list in the /usr/afs/local/sysid file - and registers the interfaces in the VLDB. The database server processes - use a similar procedure when initializing, to determine which interfaces to - use for communication with the peer processes on other database machines in - the cell. -
The NetRestrict file is in ASCII format. One IP address - appears on each line, in dotted decimal format. The order of the - addresses is not significant. The value 255 is a wildcard - that represents all possible addresses in that field. For example, the - value 192.12.105.255 indicates that the Cache - Manager does not register any of the addresses in the - 192.12.105 subnet. -
To display the File Server interface addresses registered in the VLDB, use - the vos listaddrs command. -
Related Information -
sysid -
-
- -
-
-
Disables authorization checking -
Description -
The NoAuth file, if present in a server machine's - /usr/afs/local directory, indicates to the AFS server processes - running on the machine that it is not necessary to perform authorization - checking. They perform any action for any user who logs into the - machine's local file system or issues a remote command that affects the - machine's AFS server functioning, such as commands from the AFS command - suites. Because failure to check authorization exposes the - machine's AFS server functionality to attack, there are normally only two - circumstances in which the file is present: -
In all other circumstances, the absence of the file means that the AFS - server processes perform authorization checking, verifying that the issuer of - a command has the required privilege. -
Create the file in one of the following ways: -
To remove the file, issue the bos setauth command with - on as the value for the -authrequired argument. -
The file's contents, if any, are ignored; an empty (zero-length) - file is effective. -
Related Information -
-
- -
-
-
Triggers salvaging of AFS server partitions -
Description -
The SALVAGE.fs file, if present in a file server - machine's /usr/afs/local directory, indicates to the Basic - OverSeer (BOS) Server (bosserver process) that it must invoke the - Salvager (salvager process) during recovery from a failure of the - File Server (fileserver process). -
The BOS Server creates the zero-length file each time it starts or restarts - the fs process. When the File Server exits normally (for - example, in response to the bos shutdown or bos stop - command), the BOS Server removes the file. However, if the File Server - exits unexpectedly, the file remains in the /usr/afs/local - directory as a signal that the BOS Server must invoke the Salvager process to - repair any file system inconsistencies possibly introduced during the failure, - before restarting the File Server and Volume Server processes. -
Do not create or remove this file. To invoke the Salvager process - directly, use the bos salvage command or log onto the file server - machine as the local superuser root and issue the - salvager command. -
Related Information -
salvager -
-
- -
-
-
Traces Salvager operations -
Description -
The SalvageLog file records a trace of Salvager - (salvager process) operations on the local machine and describes - any error conditions it encounters. -
If the SalvageLog file does not already exist in the - /usr/afs/logs directory when the Salvager starts, the process - creates it and writes initial start-up messages to it. If there is an - existing file, the Salvager renames is to SalvageLog.old, - overwriting the existing SalvageLog.old file if it - exists. -
The file is in ASCII format. Administrators listed in the - /usr/afs/etc/UserList file can use the bos getlog - command to display its contents. Alternatively, log onto the file - server machine and use a text editor or a file display command such as the - UNIX cat command. By default, the mode bits on the - SalvageLog file grant the required r (read) - permission to all users. -
The Salvager records operations only as it completes them, and cannot - recover from failures by reviewing the file. The log contents are - useful for administrative evaluation of process failures and other - problems. -
Related Information -
UserList -
salvager -
-
- -
-
-
Purpose -
Logs error messages from the Tape Coordinator process -
Description -
The TE_device_name file logs error messages generated - by the Backup System Tape Coordinator (butc process) that controls - the tape device or backup data file indicated by device_name. -
As the Tape Coordinator initializes, it creates the file in ASCII format in - the /usr/afs/backup directory. If there is an existing file, - the Tape Coordinator renames it to - TE_device_name.old, overwriting the - existing TE_device_name.old file if it - exists. -
For a tape device, the Tape Coordinator derives the variable - device_name portion of the filename from the device pathname listed - in the local /usr/afs/backup/tapeconfig file, by stripping off the - initial /dev/ string and replacing any other slashes in the name - with underscores. For example, the filename for a device called - /dev/rmt/4m is TE_rmt_4m. Similarly, for a backup - data file the Tape Coordinator strips off the initial slash (/) and replaces - any other slashes in the name with underscores. For example, the - filename for a backup data file called /var/tmp/FILE is - TE_var_tmp_FILE. -
The messages in the file describe the error and warning conditions the Tape - Coordinator encounters as it operates. For instance, a message can list - the volumes that are inaccessible during a dump operation, or warn that the - Tape Coordinator is overwriting a tape or backup data file. The - messages also appear in the /usr/afs/backup/TL_device_name - file, which traces most of the Tape Coordinator's actions. -
Related Information -
butc -
-
- -
-
-
Defines client machine's cell membership -
Description -
The client version of the ThisCell file defines the complete - Internet domain-style name (for example, abc.com) of the - cell to which the local client machine belongs. It must reside in the - /usr/vice/etc directory on every AFS client machine. To - change a client machine's cell membership, edit the file and reboot the - machine. -
The file is in ASCII format and contains a character string on a single - line. The IBM AFS Quick Beginnings instructs the - administrator to create it during the installation of each client - machine. -
The client machine's cell membership determines three defaults - important to its functioning: -
The client version of the ThisCell file is distinct from the - server version, which resides in the /usr/afs/etc directory on each - AFS server machine. If a server machine also runs as a client, it is - acceptable for the server and client versions of the file on the same machine - to name different cells. However, the behavior that results from this - configuration can be more confusing than useful. -
Related Information -
-
- -
-
-
Defines server machine's cell membership -
Description -
The server version of the ThisCell file defines the complete - Internet domain-style name (for example, abc.com) of the - cell to which the server machine belongs. It must reside in the - /usr/afs/etc directory on every AFS server machine. -
The file is in ASCII format and contains a character string on a single - line. The initial version of the file is created with the bos - setcellname command during the installation of the cell's first - file server machine, and the IBM AFS Quick Beginnings includes - instructions for copying it over to additional server machine during their - installation. -
The only reason to edit the file is as part of changing the cell's - name, which is strongly discouraged because of the large number of - configuration changes involved. In particular, changing the cell name - requires rebuilding the entire Authentication Database, because the - Authentication Server combines the cell name it finds in this file with each - user and server password and converts the combination into an encryption key - before recording it in the Database. -
The server version of the ThisCell file is distinct from the - client version, which resides in the /usr/vice/etc directory on - each AFS client machine. If a server machine also runs as a client, it - is acceptable for the server and client versions of the file on the same - machine to name different cells. However, the behavior that results - from this configuration can be more confusing than useful. -
Related Information -
-
- -
-
-
Purpose -
Traces Tape Coordinator operations and logs errors -
Description -
The TL_device_name file logs the actions performed by - the Backup System Tape Coordinator (butc process) that controls the - tape device or backup data file indicated by device_name. It - also records the same error and warning messages written to the - TE_device_name file. -
As the Tape Coordinator initializes, it creates the file in ASCII format in - the /usr/afs/backup directory. If there is an existing file, - the Tape Coordinator renames it to - TL_device_name.old, overwriting the - existing TL_device_name.old file if it - exists. -
For a tape device, the Tape Coordinator derives the variable - device_name portion of the filename from the device pathname listed - in the local /usr/afs/backup/tapeconfig file, by stripping off the - initial /dev/ string and replacing any other slashes in the name - with underscores. For example, the filename for a device called - /dev/rmt/4m is TL_rmt_4m. Similarly, for a backup - data file the Tape Coordinator strips off the initial slash (/) and replaces - any other slashes in the name with underscores. For example, the - filename for a backup data file called /var/tmp/FILE is - TL_var_tmp_FILE. -
Related Information -
butc -
-
- -
-
-
Defines privileged administrators -
Description -
The UserList file lists the AFS usernames of the system - administrators authorized to issue privileged bos, vos, - and backup commands that affect the local server machine or the - volumes housed on it. It must reside in the /usr/afs/etc - directory on every server machine. -
Although the UserList file is in ASCII format, do not use a text - editor to alter it. Instead always use the appropriate commands from - the bos command suite: -
Although it is theoretically possible to list different administrators in - the UserList files on different server machines, doing so can cause - unanticipated authorization failures and is not recommended. In cells - that run the United States edition of AFS and use the Update Server to - distribute the contents of the /usr/afs/etc directory, it is - customary to edit only the copy of the file stored on the system control - machine. In cells that run the international version of AFS, edit the - file on each server machine individually. -
Related Information -
upclient -
upserver -
-
- -
-
-
Houses a chunk of AFS data in the disk cache -
Description -
A Vn file can store a chunk of cached AFS data on a - client machine that is using a disk cache. As the Cache Manager - initializes, it verifies that the local disk cache directory houses a number - of Vn files equal to the largest of the following: -
The Cache Manager determines the cache size from the -blocks - argument to the afsd command, or if the argument is not included, - from the third field of the /usr/vice/etc/cacheinfo file. - The default chunk size is 64 KB; use the -chunksize argument - to the afsd command to override it. To override the default - number of chunks resulting from the calculation, include the -files - argument to the afsd command. The afsd reference - page describes the restrictions on acceptable values for each of the - arguments. -
If the disk cache directory houses fewer Vn files than - necessary, the Cache Manager creates new ones, assigning each a unique integer - n that distinguishes it from the other files; the integers start - with 1 and increment by one for each Vn file - created. The Cache Manager removes files if there are more than - necessary. The Cache Manager also adds and removes - Vn files in response to the fs setcachesize - command, which can be used to alter the cache size between reboots. -
The standard disk cache directory name is /usr/vice/cache, but - it is acceptable to use a directory on a partition with more available - space. To designate a different directory, change the value in the - second field of the /usr/vice/etc/cacheinfo file before issuing the - afsd command, or include the -cachedir argument to the - afsd command. -
Vn files expand and contract to accommodate the size of - the AFS directory listing or file they temporarily house. As mentioned, - by default each Vn file holds up to 64 KB (65,536 bytes) - of a cached AFS element. AFS elements larger than 64 KB are divided - among multiple Vn files. If an element is smaller - than 64 KB, the Vn file expands only to the required - size. A Vn file accommodates only a single element, - so if there many small cached elements, it is possible to exhaust the - available Vn files without reaching the maximum cache - size. -
Cautions -
Editing or removing a Vn file can cause a kernel - panic. To alter cache size (and thus the number of - Vn files) between reboots, use the fs - setcachesize command. Alternatively, alter the value of the - -blocks, -files or -chunksize arguments to - the afsd command invoked in the machine's AFS initialization - file, and reboot. To refresh the contents of one or more - Vn files, use the fs flush or fs - flushvolume command. If a Vn file is - accidentally modified or deleted, rebooting the machine usually restores - normal performance. -
Related Information -
afsd -
fs flush -
-
- -
-
-
Represents an AFS volume -
Description -
The Vvol_ID.vol file is the header - file for the AFS volume with volume ID vol_ID. There is one - such file for each volume stored on an AFS server (/vicep) - partition. The header file stores information that includes the - volume's name, ID number, type (read/write, read-only, or backup), size - and status (online, offline, or busy). To display information from the - header file, use the vos listvol or vos examine - command. -
The header file points to, but does not contain, the actual data in the - volume. It is not possible to access the AFS data except by mounting - the volume in the AFS filespace and reading its contents through the Cache - Manager. -
-
- -
-
-
Traces Volume Location Server operations -
Description -
The VLLog file records a trace of Volume Location (VL) Server - (vlserver process) operations on the local machine and describes - any error conditions it encounters. -
If the VLLog file does not already exist in the - /usr/afs/logs directory when the VL Server starts, the server - process creates it and writes initial start-up messages to it. If there - is an existing file, the VL Server renames it to VLLog.old, - overwriting the existing VLLog.old file if it exists. -
The file is in ASCII format. Administrators listed in the - /usr/afs/etc/UserList file can use the bos getlog - command to display its contents. Alternatively, log onto the server - machine and use a text editor or a file display command such as the UNIX - cat command. By default, the mode bits on the - VLLog file grant the required r (read) - permission to all users. -
The VL Server records operations only as it completes them, and cannot - recover from failures by reviewing the file. The log contents are - useful for administrative evaluation of process failures and other - problems. -
The VL Server can record messages at three levels of detail. By - default, it records only very rudimentary messages. To increase logging - to the first level of detail, issue the following command while logged onto - the database server machine as the local superuser root. -
# kill -TSTP vlserver_pid - --
where vlserver_pid is the process ID of the vlserver - process, as reported in the output from the standard UNIX ps - command. To increase to the second and third levels of detail, repeat - the command. -
To disable logging, issue the following command. -
- # kill -HUP vlserver_pid - --
To decrease the level of logging, first completely disable it and then - issue the kill -TSTP command as many times as necessary to reach - the desired level. -
Related Information -
UserList -
vlserver -
-
- -
-
-
Traces Volume Server operations -
Description -
The VolserLog file records a trace of Volume Server - (volserver process) operations on the local machine and describes - any error conditions it encounters. -
If the VolserLog file does not already exist in the - /usr/afs/logs directory when the Volume Server starts, the server - process creates it and writes initial start-up messages to it. If there - is an existing file, the Volume Server renames it to - VolserLog.old, overwriting the existing - VolserLog.old file if it exists. -
The file is in ASCII format. Administrators listed in the - /usr/afs/etc/UserList file can use the bos getlog - command to display its contents. Alternatively, log onto the file - server machine and use a text editor or a file display command such as the - UNIX cat command. By default, the mode bits on the - VolserLog file grant the required r (read) - permission to all users. -
The Volume Server records operations only as it completes them, and so - cannot recover from failures by reviewing the file. The log contents - are useful for administrative evaluation of process failures and other - problems. -
Related Information -
UserList -
-
- -
-
-
Records location mappings for volumes accessed by a Cache Manager using a - disk cache -
Description -
The VolumeItems file records the mapping between volume name and - mount point for each volume that the Cache Manager has accessed since it - initialized on a client machine using a disk cache. The Cache Manager - uses the mappings to respond correctly to queries about the current working - directory, which can come from the operating system or commands such as the - UNIX pwd command. -
As it initializes, the Cache Manager creates the binary-format - VolumeItems file in the local disk cache directory, and it must - always remain there. The conventional directory name is - /usr/vice/cache. -
Cautions -
Editing or removing the VolumeItems file can cause a kernel - panic. To refresh the contents of the file, instead use the fs - checkvolumes command. If the VolumeItems file is - accidentally modified or deleted, rebooting the machine usually restores - normal performance. -
Related Information -
afsd -
-
- -
-
-
Error message catalog for debugging the Cache Manager -
Description -
The afszcm.cat file is a message catalog for the Cache - Manager. The fstrace dump command interpreter uses it in - conjunction with the standard UNIX catalog utilities to translate Cache - Manager operation codes into character strings as it writes traces in the - fstrace trace log, which makes the log more readable. -
The conventional location for the file is the /usr/vice/etc/C/ - directory. It can be placed in another directory if the NLSPATH and - LANG environment variables are set appropriately. -
Related Information -
afsd -
-
- -
-
-
Contain the Backup Database and associated log -
Description -
The bdb.DB0 file contains the Backup Database, which - records configuration information used by the AFS Backup System along with - cross-indexed records of the tapes created and volumes dumped using the Backup - System commands. -
The bdb.DBSYS1 file is a log file in which the Backup - Server (buserver process) logs each database operation before - performing it. When an operation is interrupted, the Backup Server - replays the log to complete the operation. -
Both files are in binary format and reside in the /usr/afs/db - directory on each database server machine that runs the Backup Server. - When the Backup Server starts or restarts on a given machine, it establishes a - connection with its peers and verifies that its copy of the - bdb.DB0 file matches the copy on the other database server - machines. If not, the Backup Servers use AFS's distributed - database technology, Ubik, to distribute to all of the machines the copy of - the database with the highest version number. -
Use the commands in the backup suite to administer the Backup - Database. It is advisable to create a backup copy of the - bdb.DB0 file on tape on a regular basis, using the UNIX - tar command or another local disk backup utility. -
Related Information -
backup -
buserver -
-
- -
-
-
Purpose -
Defines configuration parameters for the Cache Manager -
Description -
The cacheinfo file defines configuration parameters for the - Cache Manager, which reads the file as it initializes. -
The file contains a single line of ASCII text and must reside in the - /usr/vice/etc directory. Use a text editor to create it - during initial configuration of the client machine; the required format - is as follows: -
mount_dir:cache_dir:cache_size - --
where -
The -blocks argument to the afsd command overrides - this value. To reset cache size without rebooting on a machine that - uses disk caching, use the fs setcachesize command. To - display the current size of a disk or memory cache between reboots, use the - fs getcacheparms command. -
Examples -
The following example cacheinfo file mounts the AFS namespace at - /afs, establishes a disk cache in the /usr/vice/cache - directory, and defines cache size as 50,000 1-kilobyte blocks. -
/afs:/usr/vice/cache:50000 - --
Related Information -
afsd -
-
- -
-
-
Purpose -
Records output from the fms command -
Description -
The fms.log file records the output generated by the - fms command. The output includes two numbers that can appear - in a tape device's entry in the /usr/afs/backup/tapeconfig - file on the Tape Coordinator machine to which the tape device is - attached: -
When transferring the numbers recorded in this file to the - tapeconfig file, adjust them as specified on the reference page for - the tapeconfig file, to improve Tape Coordinator performance during - dump operations. -
If the fms.log file does not already exist in the current - working directory, the fms command interpreter creates it. - In this case, the directory's mode bits must grant the rwx - (read, write, and execute) permissions to the - issuer of the command. If there is an existing file, the command - interpreter overwrites it, so the file's mode bits need to grant only the - w permission to the issuer of the fms command. - The fms command interpreter also writes similar information to the - standard output stream as it runs. -
The file is in ASCII format. To display its contents, log onto the - client machine and use a text editor or a file display command such as the - UNIX cat command. By default, the mode bits on the - fms.log file grant the required r permission only - to the owner (which is the local superuser root by default). -
Output -
The first few lines of the file provide a simple trace of the - fms command interpreter's actions, specifying (for example) - how many blocks it wrote on the tape. The final two lines in the file - specify tape capacity and filemark size in bytes, using the following - format: -
Tape capacity is tape_size bytes - File marks are filemark_size bytes - --
Examples -
The following example of the fms.log file specifies that - the tape used during the execution of the fms command had a - capacity of 2,136,604,672 bytes, and that the tape device writes filemarks of - size 1,910,220 bytes. -
fms test started - wrote 130408 blocks - Tape capacity is 2136604672 bytes - File marks are 1910220 bytes - --
Related Information -
fms -
-
- -
-
-
Contain the Authentication Database and associated log -
Description -
The kaserver.DB0 file contains the Authentication - Database, which records server encryption keys and an encrypted form of all - user passwords. The Authentication Server (kaserver process) - uses the information in the database to enable secured communications between - AFS server and client processes. -
The kaserver.DBSYS1 file is a log file in which the - Authentication Server logs each database operation before performing - it. When an operation is interrupted, the Authentication Server replays - the log to complete the operation. -
Both files are in binary format and reside in the /usr/afs/db - directory on each of the cell's database server machines. When the - Authentication Server starts or restarts on a given machine, it establishes a - connection with its peers and verifies that its copy of the database matches - the copy on the other database server machines. If not, the - Authentication Servers call on AFS's distributed database technology, - Ubik, to distribute to all of the machines the copy of the database with the - highest version number. -
Always use the commands in the kas suite to administer the - Authentication Database. It is advisable to create an archive copy of - the database on a regular basis, using a tool such as the UNIX tar - command. -
Related Information -
kas -
kaserver -
-
- -
-
-
Records failed authentication attempts -
Description -
The file kaserverauxdb records failed authentication attempts - for the local Authentication Server. The server creates it - automatically in the /usr/afs/local directory by default; use - the -localfiles argument to the kaserver command to - specify an alternate directory. -
The kaserverauxdb file is an internal database used by the - Authentication Server to prevent access by users who have exceeded the limit - on failed authentication attempts defined in their Authentication Database - entry. The Authentication Server refuses further attempts to - authenticate to an account listed in the database until either an AFS system - administrator issues the kas unlock command to unlock the account, - or the timeout period defined in the user's Authentication Database entry - passes. -
The kaserverauxdb file is in binary format, so its contents are - not directly accessible. However, the output from the kas - examine command reports an account's maximum number of failed - attempts, the lockout time, and whether the account is currently - locked. -
Related Information -
kaserver.DB0 and kaserver.DBSYS1 -
kaserver -
-
- -
-
-
Contain the Protection Database and associated log -
Description -
The prdb.DB0 file contains the Protection Database, which - maps AFS user, machine, and group names to their respective IDs (AFS UIDs and - GIDs) and tracks group memberships. The Protection Server - (ptserver process) uses the information in the database to help the - File Server grant data access to authorized users. -
The prdb.DBSYS1 file is a log file in which the - Protection Server logs each database operation before performing it. - When an operation is interrupted, the Protection Server replays the log to - complete the operation. -
Both files are in binary format and reside in the /usr/afs/db - directory on each of the cell's database server machines. When the - Protection Server starts or restarts on a given machine, it establishes a - connection with its peers and verifies that its copy of the database matches - the copy on the other database server machines. If not, the Protection - Servers call on AFS's distributed database technology, Ubik, to - distribute to all of the machines the copy of the database with the highest - version number. -
Always use the commands in the pts suite to administer the - Protection Database. It is advisable to create an archive copy of the - database on a regular basis, using a tool such as the UNIX tar - command. -
Related Information -
pts -
ptserver -
-
- -
-
-
Purpose -
Prevents multiple simultaneous salvage operations on a partition -
Description -
The salvage.lock file guarantees that only one Salvager - (salvager process) runs at a time on a file server machine (the - single process can fork multiple subprocesses to salvage multiple partitions - in parallel). As the Salvager initializes, it creates the empty - (zero-length) file in the /usr/afs/local directory and invokes the - flock system call on it. It removes the file when it - completes the salvage operation. Because the Salvager must lock the - file to run, only one Salvager can run at a time. -
Related Information -
salvager -
-
- -
-
-
Lists file server machine interface addresses registered in VLDB -
Description -
The sysid file records the network interface addresses that the - File Server (fileserver process) registers in the Volume Location - Database (VLDB) for the local file server machine. -
Each time the File Server restarts, it builds a list of interfaces on the - local machine by reading the /usr/afs/local/NetInfo file, if it - exists. If the file does not exist, the File Server uses the list of - network interfaces configured with the operating system. It then - removes from the list any addresses that appear in the - /usr/afs/local/NetRestrict file, if it exists. The File - Server records the resulting list in the binary-format sysid file - and registers the interfaces in the VLDB. -
When the Cache Manager requests volume location information, the Volume - Location (VL) Server provides all of the interfaces registered for each server - machine that houses the volume. This enables the Cache Manager to make - use of multiple addresses when accessing AFS data stored on a multihomed file - server machine. -
Cautions -
The sysid file is unique to each file server machine, and must - not be copied from one machine to another. If it is a common practice - in the cell to copy the contents of the /usr/afs/local directory - from an existing file server machine to a newly installed one, be sure to - remove the sysid file from the new machine before starting the - fs trio of processes, which includes the fileserver - process. -
Some versions of AFS limit how many of a file server machine's - interface addresses that can be registered. Consult the IBM AFS - Release Notes. -
Related Information -
NetRestrict (server version) -
-
- -
-
-
Defines configuration parameters for all tape devices and backup data files - on a Tape Coordinator machine -
Description -
The tapeconfig file defines basic configuration parameters for - all of the tape devices or backup data files available for backup operations - on a Tape Coordinator machine. The file is in ASCII format and must - reside in the local /usr/afs/backup directory. The - instruction for each tape device or backup data file appears on its own line - and each has the following format: -
[capacity filemark_size] device_name port_offset - --
where -
-
The Tape Coordinator uses this capacity value or the one on the Backup - System tape label to track how much space remains as it writes data to a tape - or backup data file. The appropriate value to record for a tape depends - on the size of the tapes usually used in the device and whether it has a - compression mode; for suggested values, see the IBM AFS - Administration Guide chapter on configuring the Backup System. If - using a value obtained from the fms command, reduce it by 10% to - 15% before recording it in the file. -
For a backup data file, it is best to provide a value that helps the Tape - Coordinator avoid reaching the end-of-file (EOF) unexpectedly. Make it - at least somewhat smaller than the amount of space available on the partition - housing the file when the dump operation begins, and never larger than the - maximum file size allowed by the operating system. -
Specify a (positive) integer or decimal value followed by a letter than - indicates units, with no intervening space. In a decimal number, the - number of digits after the decimal point must not translate to fractions of - bytes. The maximum acceptable value is 2048 GB (2 TB). The - acceptable units letters are as follows; if the letter is omitted, the - default is kilobytes. -
-
If this field is omitted, the Tape Coordinator uses the maximum acceptable - value (2048 GB or 2 TB). Either leave both this field and the - filemark_size field empty, or provide a value in both of them. -
The appropriate value to record for a tape depends on the size of the tapes - usually used in the device and whether it has a compression mode; for - suggested values, see the IBM AFS Administration Guide chapter on - configuring the Backup System. If using a value obtained from the - fms command, increase it by 10% to 15% before recording it in the - file. -
For backup data files, record a value of 0 (zero). The - Tape Coordinator actually ignores this field for backup data files, because it - does not use filemarks when writing to a file. -
Use the same notation as for the capacity field, but note that the - default units is bytes rather than kilobytes. The maximum acceptable - value is 2048 GB. -
If this field is empty, the Tape Coordinator uses the value 0 - (zero). Either leave both this field and the capacity field - empty, or provide a value in both of them. -
Acceptable values are the integers 0 through 58510 - (the Backup System can track a maximum of 58,511 port offset numbers). - Each value must be unique among the cell's Tape Coordinators, but any - number of them can be associated with a single machine. Port offset - numbers need not be assigned sequentially, and can appear in any order in the - tapeconfig file. Assign port offset 0 to the Tape - Coordinator for the tape device or backup data file used most often for backup - operations; doing so will allow the operator to omit the - -portoffset argument from the largest possible number of - backup commands. -
Privilege Required -
Creating the file requires UNIX w (write) and - x (execute) permissions on the - /usr/afs/backup directory. Editing the file requires UNIX - w (write) permission on the file. -
Examples -
The following example tapeconfig file configures three tape - devices and a backup data file. The first device has device name - /dev/rmt/0h, and is assigned port offset 0 because it - will be the most frequently used device for all backup operations in the - cell. Its default tape capacity is 2 GB and filemark size is 1 - MB. The /dev/rmt/3h drive has half the capacity but a much - smaller filemark size; its port offset is 3. The third - device listed, /dev/rmt/4h, has the same capacity and filemark size - as the first device and is assigned port offset 2. Port - offset 4 is assigned to the backup data file /dev/FILE, - which is actually a symbolic link to the actual file located elsewhere on the - local disk. The Tape Coordinator writes up to 1.5 GB into the - file; as recommended, the filemark size is set to zero. -
2G 1M /dev/rmt/0h 0 - 1g 4k /dev/rmt/3h 3 - 2G 1m /dev/rmt/4h 2 - 1.5G 0 /dev/FILE 4 - --
Related Information -
butc -
fms -
-
- -
-
-
Contain the Volume Location Database and associated log -
Description -
The file vldb.DB0 contains the Volume Location Database - (VLDB), which tracks the location of all AFS volumes stored on file server - machines in the cell. The Volume Location (VL) Server - (vlserver process) provides information from the database to Cache - Managers when they need to access AFS data. -
The file vldb.DBSYS1 is a log file in which the VL Server - logs each database operation before performing it. When an operation is - interrupted, the VL Server replays the log to complete the operation. -
Both files are in binary format and reside in the /usr/afs/db - directory on each of the cell's database server machines. When the - VL Server starts or restarts on a given machine, it establishes a connection - with its peers and verifies that its copy of the database matches the copy on - the other database server machines. If not, the VL Servers call on - AFS's distributed database technology, Ubik, to distribute to all of the - machines the copy of the database with the highest version number. -
Always use the commands in the vos suite to administer the - VLDB. It is advisable to create an archive copy of the database on a - regular basis, using a tool such as the UNIX tar command. -
Related Information -
vlserver -
vos -
-
- -
-
-
Provides instructions for the afsmonitor command -
Description -
The afsmonitor configuration file determines which machines the - afsmonitor command probes for File Server or Cache Manager - statistics and which statistics it gathers. Use the -config - argument to the afsmonitor command to identify the configuration - file to use. -
The instructions that can appear in the configuration file are as - follows: -
The afsmonitor program passes the following parameters to the - cmd_to_execute: -
The parameters fs, cm, field_name, - threshold_val, and arg1 through - argn correspond to the values with the same name on the - thresh line. The host_name parameter identifies the - file server or client machine where the statistic has crossed the threshold, - and the actual_val parameter is the actual value of - field_name that exceeds the threshold value. -
Use the thresh line to set either a global threshold, which - applies to all file server machines listed on fs lines or client - machines listed on cm lines in the configuration file, or a - machine-specific threshold, which applies to only one file server or client - machine. -
If there are no show lines in the configuration file, then the - screens display all statistics for both Cache Managers and File - Servers. Similarly, if there are no show fs lines, the - File Servers screen displays all file server statistics, and if - there are no show cm lines, the Cache Managers screen - displays all client statistics. -
For a list of the values that can appear in the - field/group/section field of a show instruction, see the - afsmonitor statistics appendix to the IBM AFS Administration - Guide. -
Related Information -
-
- -
-
-
Provides instructions for the package command -
Description -
The package configuration file defines the file system elements - that the package command creates or alters on the local disk of an - AFS client machine it is configuring. Use the -config or - -fullconfig argument to the package command to identify - the configuration file to use. -
Summary of Configuration File Instructions -
The configuration file can include one or more instances of each of the - following instructions, each on its own line. A more detailed - description of each instruction's syntax follows this list. -
The B and C Instructions for Defining Block and Character Special - Devices - - - - - - - - - - - - - - - -
The B instruction in a package configuration file - defines a block special device, such as a disk, that deals with input in units - of multi-byte command blocks. The C instruction defines a - character special device, such as a terminal or tty, that deals with input in - single character units. They share a common syntax: -
{B | C} device_name major_device minor_device owner group mode_bits - --
where -
The D Instruction for Creating a Directory - - - - - - - -
The D instruction in a package configuration file - creates a directory on the local disk. If a symbolic link, file, or - other element on the local disk has the same name, it is replaced with a - directory. If the directory already exists, its owner, group, and mode - bits are changed if necessary to conform with the instruction. The - instruction has the following syntax: -
D[update_code] directory owner group mode_bits - --
where -
The F Instruction for Creating or Updating a File - - - - - - - -
The F instruction in a package configuration file - creates or updates a file on the local disk by copying in the contents of the - indicated source file, which can reside in AFS or on the local disk. If - the package command interpreter cannot access the source file, it - exits without executing any instruction in the configuration file. -
If a file with the same name already exists on disk, the package - command overwrites it with the contents of the source file, unless the - I update code is used to prevent that. To add a - .old extension to the current version of the file, include - the O update code. To have the machine reboot automatically - after the package program completes, include the Q - update code. -
If a symbolic link, directory, or other element on the local disk has the - same name, it is replaced with the file (a directory's contents are first - removed as necessary). -
The instruction has the following syntax: -
F[update_code] file source_file [owner group mode_bits] - --
where -
If the A update code is included, specify the source file's - complete pathname. Otherwise, the package command derives - the source file's full name by appending the file pathname to - this pathname. For example, if the A update code is not - included and the file /afs/abc.com/rs_aix42/bin/grep is the - source file for the /bin/grep binary, the proper value in this - field is /afs/abc.com/rs_aix42. -
To copy the source file's owner to the target file, leave this field - empty. In this case, the group and mode_bits fields - must also be empty. -
To copy the source file's group to the target file, leave this field - empty. In this case, the owner and mode_bits fields - must also be empty. -
To copy the source file's mode bits to the target file, leave this - field empty. In this case, the owner and group fields - must also be empty. -
The L Instruction for Creating a Symbolic Link - - - - - - - -
The L instruction in a package configuration file - creates a symbolic link on the local disk to a directory or file that exists - either in AFS or elsewhere on the local disk. As with the standard UNIX - ln -s command, the link is created even if the actual file or - directory does not exist. -
If a file or directory on the local disk already has the same name, the - package command replaces it with a symbolic link. -
The instruction has the following syntax: -
L[update_code] link actual_path [owner group mode_bits] - --
where -
The package command interpreter correctly handles pathnames that - begin with the ./ (period, slash) or - ../ (two periods, slash) notation, interpreting them - relative to the current working directory from which the package - command is invoked. -
To designate the issuer of the package command (usually, the - local superuser root) as the symbolic link's owner, leave this - field empty. In this case, the group and mode_bits - fields must also be empty. -
To have the symbolic link's group match the default group associated - with the package command's issuer, leave this field - empty. The issuer is usually the local superuser root and - the default group is designated in the issuer's entry in the local - /etc/passwd file or equivalent. If this field is left empty, - the owner and mode_bits fields must also be empty. -
Leaving this field empty sets the symbolic link's mode bits to - 777 (rwxrwxrwx). In this case, the owner - and group fields must also be empty. -
The S Instruction for Creating a Socket - - - - - - - -
The S instruction in a package configuration file - creates a socket (a communications device for UDP or TCP/IP connections) on - the local disk. The instruction has the following syntax: -
S socket [owner group mode_bits] - --
where -
To designate the issuer of the package command (usually, the - local superuser root) as the socket's owner, leave this field - empty. In this case, the group and mode_bits fields - must also be empty. -
To have the symbolic link's group match the default group associated - with the package command's issuer, leave this field - empty. The issuer is usually the local superuser root and - the default group is designated in the issuer's entry in the local - /etc/passwd file or equivalent. If this field is left empty, - the owner and mode_bits fields must also be empty. -
Leaving this field empty sets the symbolic link's mode bits to - 777 (rwxrwxrwx), modulated by the cell's - umask. In this case, the owner and group fields must - also be empty. -
The %define or %undef Instructions Declaring or Undeclaring a - Definition - - - - - - -
The %define instruction in a package configuration - file declares or defines a variable, depending on its number of - arguments: -
The %undef statement negates the effect of a previous - %define statement, declaring its argument to be defined no longer, - or to have a value no longer if it is a variable. -
The syntax for the two types of instruction are as follows: -
%define declaration - %define variable value - %undef declaration - %undef variable - --
where -
The %ifdef and %ifndef Instructions for Specifying a Conditional - Action to Perform - - - - - - -
The %ifdef instruction in a package configuration - file specifies one or more actions to perform if the indicated string has been - declared by a single-argument %define statement, or is a variable - for which a value has been defined by a two-argument %define - statement. -
Similarly, the %ifndef instruction specifies one or more actions - to perform if the indicated string has not been declared or is a variable - without a value, either because no %define statement has defined it - or an %undef statement has undefined it. -
In both cases, the optional %else statement specifies one or - more alternate actions to perform if the first statement evaluates to - false. (For an %ifdef statement, the - %else statement is executed if the indicated string has never been - declared or is a variable without a value, or if an %undef - statement has undefined either one; for an %ifndef statement, - it is executed if the string has been declared or is a variable with a - value.) -
It is possible to nest any number of %ifdef and - %ifndef statements. -
The two types of statement share a common syntax: -
%ifdef | ifndef declaration - action+ - [%else [declaration] - alternate_action+] - %endif declaration - --
where -
The %include Instruction for Including a Library File - - - -
The %include instruction in a package configuration - file includes the contents of the indicated library file in a configuration - file that results from the compilation of the prototype file in which the - %include instruction appears. It has the following - syntax: -
%include pathname - --
where -
Cautions -
The configuration file must be completely correct. If there are any - syntax errors or incorrect values, the package command interpreter - exits without executing any instruction. -
Examples -
The following example B and C instructions define a - disk /dev/hd0a with major and minor device numbers 1 and - 0 and mode bits of -rw-r--r--, and a tty - /dev/ttyp5 with major and minor device numbers 6 and - 5 and mode bits of -rw-rw-rw. In both cases, the - owner is root and the owning group wheel. -
B /dev/hd0a 1 0 root wheel 644 - C /dev/ttyp5 6 5 root wheel 666 - --
The following example D instruction creates the local - /usr directory with owner root and group - wheel and mode bits of drwxr-xr-x. The - R update code removes any files and subdirectories that reside in - the /usr directory (if it already exists) but do not appear in the - configuration file. -
DR /usr root wheel 755 - --
The following example F instruction, appropriate for a machine - running AIX 4.2 in the ABC Corporation cell, creates or updates the - local disk file /bin/grep, using - /afs/abc.com/rs_aix42/bin/grep as the source. -
F /bin/grep /afs/abc.com/rs_aix42 root wheel 755 - --
The next example F instruction creates the - /usr/vice/etc/ThisCell file and specifies an absolute pathname for - the source file, as indicated by the A update code. The - Q code makes the package command return status code 4 as - it exits, prompting a reboot of the machine if the standard - package-related changes have been made to the machine's AFS - initialization file. No values are provided for the owner, group and - mode bits, so the file inherits them from the source file. -
FAQ /usr/vice/etc/ThisCell /afs/abc.com/common/etc/ThisCell - --
The following example L instruction, appropriate for a machine - running AIX 4.2 in the ABC Corporation cell, creates a symbolic link - from /etc/ftpd on the local disk to the file - /afs/abc.com/rs_aix42/etc/ftpd. -
L /etc/ftpd /afs/abc.com/rs_aix42 root wheel 644 - --
The following example S instruction defines the socket - /dev/printer. -
- S /dev/printer root wheel 777 - --
The following example %define instruction defines the value for - the variable ${diskmode}. This variable is used elsewhere in - the template to fill the owner_name, group_name, and - mode_bits fields in a D, F, or L - instruction. -
%define diskmode root wheel 644 - --
The following example %undef instruction declares the string - afsd not to be defined. -
%undef afsd - --
The following example %ifdef instruction specifies that if the - string rs_aix42 is currently declared, then when the prototype file - containing the instruction is compiled the three indicated library files are - included. There is no alternate action defined. There must be - %define statements earlier in the prototype file to declare - rs_aix42 and to assign a value to the ${wsadmin} - variable. -
%ifdef rs_aix42 - %include ${wsadmin}/lib/rs_aix42.readonly - %include ${wsadmin}/lib/rs_aix42.generic - %include ${wsadmin}/lib/rs_aix42.generic.dev - %endif rs_aix42 - --
The following example %ifndef instruction, appropriate for the - State University cell, defines stateu.edu as the value of - the ${cell} variable if it does not already have a value. -
%ifndef cell - %define cell stateu.edu - %endif cell - --
The following example %include instruction includes the library - file base.generic from the lib subdirectory of - the directory in which package-related files reside. The - ${wsadmin} variable resolves to an actual pathname (such as - /afs/abc.com/wsadmin) during compilation. -
%include ${wsadmin}/lib/base.generic - --
Related Information -
package -
-
- -
-
-
Purpose -
Provides instructions for the uss bulk command -
Description -
The uss bulk input file lists instructions for the - uss command interpreter to execute when running the uss - bulk command. If the file includes add instructions - that reference a uss template file, then the template file must - also exist. -
Summary of Bulk Input File Instructions -
The bulk input file can include the following instructions, each on its own - line. A more detailed description of each instruction's syntax - follows this list. -
The add Instruction for Creating an Account - - -
The add instruction creates a user account. Each instance - in the bulk input file is equivalent in effect to a uss add command - issued on the command line. The order of the instruction's fields - matches the order of arguments to the uss add command, although - some arguments do not have a corresponding field. Like the uss - add command's arguments, many of the fields correspond to (provide - a value for) a variable in the uss template file, as indicated in - the following description of each field. -
The instruction's syntax is as follows. It appears on multiple - lines here only for the sake of legibility--each add - instruction must appear on a single line in the bulk input file. -
add username[:full_name][:initial_password][:password_expires] - [:file_server][:partition][:mount_point][:uid][:var1][:var2] - [:var3][:var4][:var5][:var6][:var7][:var8][:var9][:] - --
To omit a value for a field (presumably because it is optional or the - template specifies a constant value for it), type nothing between the two - colons that surround it. After the last argument provided, end the line - with either a colon and carriage return, or a carriage return alone. -
The meaning of, and acceptable values for, each field are as - follows. -
Corresponding argument to the uss add command: - -user. Corresponding variable in the template file: - $USER. -
Corresponding argument to the uss add command: - -realname. Corresponding variable in the template - file: $NAME. Many operating systems include a field for the full - name in a user's entry in the local password file (/etc/passwd - or equivalent), and this variable can be used to pass a value to be used in - that field. -
Corresponding argument to the uss add command: - -pass. Corresponding variable in the template file: - none. -
When the password becomes invalid (expires), the user is unable to - authenticate, but has 30 more days in which to issue the kpasswd - command to change the password (after that, only an administrator can change - it). -
Corresponding argument to the uss add command: - -pwexpires. Corresponding variable in the template - file: $PWEXPIRES. -
Corresponding argument to the uss add command: - -server. Corresponding variable in the template file: - $SERVER. -
/vicepa = vicepa = a = 0 - /vicepb = vicepb = b = 1 - --
-
After /vicepz (for which the index is 25) comes -
/vicepaa = vicepaa = aa = 26 - /vicepab = vicepab = ab = 27 - --
and so on through -
/vicepiv = vicepiv = iv = 255 - --
Corresponding argument to the uss add command: - -partition. Corresponding variable in template: - $PART. -
Corresponding argument to the uss add command: - -mount. -
Corresponding variable in template: $MTPT, but in the template - file's V instruction only. Occurrences of the $MTPT - variable in template instructions that follow the V instruction - take their value from the V instruction's mount_point - field. Thus the value of this command line argument becomes the value - for the $MTPT variable in instructions that follow the V - instruction only if the string $MTPT appears alone in the V - instruction's mount_point field. -
Corresponding argument to the uss add command: - -uid. Corresponding variable in template: $UID. -
Corresponding argument to the uss add command: - -var. Corresponding variables in template: $1 through - $9. -
If providing a value in any of the fields, then in every field that - precedes it either provide an actual value or indicate an empty field by - putting nothing between two colons. It is acceptable, but not - necessary, to indicate empty fields by putting colons after the last field - that contains an actual value. -
The delete Instruction for Deleting an Account - - -
The delete instruction deletes a user account from the - system. Each instance in the bulk input file is equivalent in effect to - a uss delete command issued on the command line. The order - of the instruction's fields matches the order of arguments to the - uss delete command: -
delete username:mount_point_path[:{ savevolume | delvolume }][:] - --
where -
After the last argument provided, end the line with either a colon and - carriage return or a carriage return alone. -
The exec Instruction for Executing a Command -
The exec instruction executes the specified command, which can - be a UNIX shell script or command, a program, or an AFS command. The - uss command interpreter must have the necessary privileges in AFS - and the local file system; it assumes the AFS and local identities of the - issuer of the uss bulk command. -
The instruction's syntax is as follows: -
exec command - --
The delvolume and savevolume Instructions for Setting the Default - Treatment of Volumes - - - - -
The savevolume and delvolume instructions determine - the default treatment of volumes referenced by the delete - instructions that follow them in the bulk input file. Their syntax is - as follows: -
savevolume - delvolume - --
The savevolume instruction prevents the removal of the volume - and VLDB entry for all delete instruction that follow it in the - bulk input file, and the delvolume instruction removes the volume - and VLDB entry for all subsequent delete instructions. - Either setting persists until its opposite appears in the file, or until the - end of the bulk file. -
If neither line appears in the bulk input file, the default is to remove - the volume and the VLDB entry; delete instructions that appear - before the first savevolume instruction are also subject to this - default. If a delete instruction's third field - specifies either savevolume or delvolume, that setting - overrides the default. -
Examples -
The following example add instruction creates an - authentication-only account. The user's initial password is - changeme (the default). -
add anderson - --
The following example add instructions refer to the indicated - V instruction in a template file (which must appear on a single - line in the template file). -
add smith:John Smith:::fs1:a:::::marketing - add jones:Pat Jones:::fs3:c:::::finance - V user.$USER $SERVER.abc.com /vicep$PART 2000 \ - /afs/abc.com/usr/$3/$USER $UID $USER all - --
The first add instruction creates an account called - smith in the Protection and Authentication Databases, with an - initial password changeme and a value for $UID provided by the - Protection Server. The volume user.smith resides on - partition /vicepa of file server machine - fs1.abc.com and is mounted at - /afs/abc.com/usr/marketing/smith. He owns his home - directory and has all access permissions on its root directory's access - control list (ACL). The account for jones is similar, except - that the volume resides on partition /vicepc of file server machine - fs3.abc.com and is mounted at - /afs/abc.com/usr/finance/jones. -
Notice that the fields corresponding to the volume mount point, UID, $1 - variable, and $2 variable are empty (between a and - marketing on the first example line), because their corresponding - variables do not appear in the template file. The initial password - field is also empty. -
The following add instructions are equivalent in effect to the - preceding example, but explicitly indicate empty fields for all of the number - variables that don't have a value: -
add smith:John Smith:::fs1:a:::::marketing:::::: - add jones:Pat Jones:::fs3:c:::::finance:::::: - --
The following example shows a complete bulk file containing a set of - delete instructions combined with a savevolume - instruction. Because the delete instruction for users - smith, pat, and rogers appear before the - savevolume instruction and the third field is blank in each, the - corresponding home volumes are removed. The volume for user - terry is retained because the default established by the - savevolume instruction applies to it, but user - johnson's volume is removed because the third field of her - delete instruction overrides the current default. -
delete smith:/afs/abc.com/usr/smith - delete pat:/afs/abc.com/usr/pat - delete rogers:/afs/abc.com/usr/rogers - savevolume - delete terry:/afs/abc.com/usr/terry - delete johnson:/afs/abc.com/usr/johnson:delvolume - --
The following example exec instruction appears between sets of - add and delete instructions in a bulk input file. - A message appears in the command shell where the uss bulk command - is issued, to indicate when the additions are finished and the deletions - beginning. -
exec echo "Additions completed; beginning deletions..." - --
Related Information -
uss add -
uss bulk -
-
- -
-
-
Provides instructions for the uss add command -
Description -
The uss template file defines the components of an AFS user - account that the uss add command (or add instruction in - a uss bulk input file) creates. Use the -template - argument to the uss add or uss bulk command to identify - the template file. -
Summary of Template File Instructions -
The template file can include the following instructions, each on its own - line. A more detailed description of each instruction's syntax - follows this list. -
If the template file is empty (zero-length), the uss add command - or add instruction in a bulk input file only creates an entry in - the Protection and Authentication Databases, naming them according to the name - specified with the uss add command's -user - argument, or in the bulk input file add instruction's - username field. -
The A Instruction for Setting the Default Treatment of Volumes - - - - - - - -
The A instruction in a uss template file enhances - cell security by imposing the following restrictions on users' password - choice and authentication attempts. For further information on these - limits, see the IBM AFS Administration Guide and the kas - setfields reference page. -
The instruction has the following syntax: -
A username password_lifetime password_reuse failures locktime - --
where -
Specify an integer from the range 1 through 254 to - specify the number of days until expiration, the value 0 to - indicate that the password never expires, or the value $PWEXPIRES - to read in the number of days from the uss add or uss - bulk command's -pwexpires argument. If the - A instruction does not appear in the template file, the default is - for the user's password never to expire. -
Specify an integer from the range 1 through 254 to - specify the number of failures permitted, or the value 0 to - indicate that there is no limit to the number of unsuccessful attempts. - If the A instruction does not appear in the template file, the - default is to allow an unlimited number of failures. -
Specify a number of hours and minutes (hh:mm) or minutes - only (mm), from the range 01 (one minute) through - 36:00 (36 hours). The Authentication Server - automatically reduces any larger value to 36:00 and also - rounds up any non-zero value to the next higher multiple of 8.5 - minutes. A value of 0 (zero) sets an infinite lockout - time; an administrator must always issue the kas unlock - command to unlock the account. -
The D Instruction for Creating a Directory - - - - - - - - - - - -
The D instruction in a uss template file creates a - directory. Its intended use is to create a subdirectory in the user - home directory created by the V instruction in the template - file. -
Any number of D instructions can appear in the template - file. If any variables in the instruction take their values from the - V instruction (notably, the $MTPT variable), the instruction must - follow the V instruction in the file. -
Although it is possible to use the D instruction to create a - directory on the local disk of the machine where the uss command is - issued, it is not recommended. The preferred method for automated - creation of directories on a local disk is the package - program. Two complications arise if the pathname field refers - to a local disk directory: -
The instruction has the following syntax: -
D pathname mode_bits owner ACL - --
where -
Specify the read/write path to the directory, to avoid the failure that - results from attempting to create a new directory in a read-only - volume. By convention, the read/write path is indicated by placing a - period before the cell name at the pathname's second level (for example, - /afs/.abc.com). For further discussion of the - concept of read/write and read-only paths through the filespace, see the - reference page for the fs mkmount command. -
For an AFS directory, grant all permissions to the directory's owner - at least. Usually that is the new user, in which case the appropriate - value is $USER all. -
It is not possible to grant any permissions to the issuer of the - uss command. As the last step in account creation, the - uss command interpreter automatically deletes that person from any - ACLs set during the creation process. -
The E Instruction for Creating a Single-line File - - - - - - -
The E instruction in a uss template file creates a - file by echoing a specified character string into it. Its intended use - is to create files in the user home directory created by the V - instruction in the template file, or in a subdirectory created by a - D instruction. -
Any number of E instructions can appear in the template - file. If the file resides in a directory created by a D - instruction, the E instruction must follow the D - instruction in the file. -
The E and F instructions have complementary - advantages. The character string echoed into the file by an - E instruction can be customized for each user, because it can - include the standard variables for which the uss command - interpreter substitutes the values specified by arguments to the uss - add command or fields in a bulk input file add - instruction. In contrast, a file created using the F - instruction cannot include variables and so has the same content for all - users. However, a file created by an E instruction can be a - single line only, because no carriage returns (newline characters) are allowed - in the character string. -
Although it is possible to use the E instruction to create a - file on the local disk of the machine where the uss command is - issued, it is not recommended. The preferred method for automated - creation of files on a local disk is the package program. - The main complication is that designating any user other than the issuer as - the new file's owner requires logging onto the machine as the local - superuser root. For local disk files, only the local - superuser root is allowed to issue the UNIX chown - command that the uss command interpreter invokes to change the - owner from the default value (the file's creator, which in this case is - the issuer of the uss command). The issuer must then also - use the -admin argument to the uss add or uss - bulk command to authenticate as a privileged AFS administrator, which is - required for creating the Authentication Database and Protection Database - entries that the uss command interpreter always creates for a new - account. -
The instruction has the following syntax: -
E pathname mode_bits owner "contents" - --
where -
Specify the read/write path to the file, to avoid the failure that results - from attempting to create a new file in a read-only volume. By - convention, the read/write path is indicated by placing a period before the - cell name at the pathname's second level (for example, - /afs/.abc.com). For further discussion of the - concept of read/write and read-only paths through the filespace, see the - reference page for the fs mkmount command. -
The F Instruction for Creating a File - from a Prototype - - - - - - -
The F instruction in a uss template file creates a - file by copying the contents of an existing file (the prototype) - into it. Its intended use is to create files in the user home directory - created by the V instruction in the template file, or in a - subdirectory created by a D instruction. -
Any number of F instructions can appear in the template - file. If the file resides in a directory created by a D - instruction, the F instruction must follow the D - instruction in the file. -
The E and F instructions have complementary - advantages. A file created using the F instruction has the - same content for all users, whereas a file created by an E - instruction can be customized for each user if it includes variables. - However, a file created by an E instruction can be a single line - only, whereas the prototype file copied by an F instruction can be - any length. -
Although it is possible to use the F instruction to create a - file on the local disk of the machine where the uss command is - issued, it is not recommended. The preferred method for automated - creation of files on a local disk is the package program. - The main complication is that designating any user other than the issuer as - the new file's owner requires logging onto the machine as the local - superuser root. For local disk files, only the local - superuser root is allowed to issue the UNIX chown - command that the uss command interpreter invokes to change the - owner from the default value (the file's creator, which in this case is - the issuer of the uss command). The issuer must then also - use the -admin argument to the uss add or uss - bulk command to authenticate as a privileged AFS administrator, which is - required for creating the Authentication Database and Protection Database - entries that the uss command interpreter always creates for a new - account. -
The instruction has the following syntax: -
F pathname mode_bits owner prototype_file - --
where -
Specify the read/write path to the file, to avoid the failure that results - from attempting to create a new file in a read-only volume. By - convention, the read/write path is indicated by placing a period before the - cell name at the pathname's second level (for example, - /afs/.abc.com). For further discussion of the - concept of read/write and read-only paths through the filespace, see the - reference page for the fs mkmount command. -
The G Instruction for Facilitating Even - Distribution of Home Directories - - - - - - -
The G instruction in a uss template file creates a - directory as one of the set of directories from which the uss - command interpreter selects when choosing a new user home directory's - parent directory. More specifically, when the $AUTO variable appears in - the mount_point field of a V instruction, the command - interpreter substitutes for it the directory defined by a G - instruction that currently has the fewest entries. -
The instruction's intended use is to distribute user accounts evenly - among several directories, rather than using directories that reflect - divisions such as departmental affiliation. Distributing home - directories in this fashion is useful mainly in very large cells where storing - all user home directories under a single parent directory potentially slows - directory lookup, or where a workplace-based division results in unevenly - sized directories such that some users consistently experience slower - directory lookup than others. See the chapter on uss in the - IBM AFS Administration Guide for more information. -
Any number of G instructions can appear in the template - file. If the V instruction includes the $AUTO variable, it - must appear after all of the G instructions in the file. -
The instruction has the following syntax: -
G directory - --
where -
Specify the read/write path to the directory, to avoid the failure that - results from attempting to create a new mount point in a read-only volume when - the $AUTO variable is used in a V instruction's - mount_point field. By convention, the read/write path is - indicated by placing a period before the cell name at the pathname's - second level (for example, /afs/.abc.com). For - further discussion of the concept of read/write and read-only paths through - the filespace, see the reference page for the fs mkmount - command. -
The L and S Instructions for Creating a Link - - - - - - - - - - - - - -
The L instruction in a uss template file creates a - hard link between two files, as achieved by the standard UNIX ln - command. The S instruction creates a symbolic link between - two files, as achieved by the standard UNIX ln -s command. A - full explanation of links is beyond the scope of this document, but the basic - effect is to create a second name for an existing file, enabling access via - either name. Creating a link does not create a second copy of the - file. -
AFS allows hard links only if the linked files reside in the same - directory, because it becomes difficult to determine which access control list - (ACL) applies to the file if the two copies reside in directories with - different ACLs. AFS allows symbolic links between two files that reside - in different directories, or even different volumes. The File Server - uses the ACL associated with the actual file rather than the link. -
Any number of L and S instructions can appear in the - template file. If the existing file or link is to reside in a directory - created by a D instruction, or if the existing file was created by - an E or F instruction, the L or S - instruction must follow the D, E, or F - instruction. -
The instructions share the following syntax: -
L existing_file link - S existing_file link - --
where -
Specify the read/write path to the link, to avoid the failure that results - from attempting to create a new link in a read-only volume. By - convention, the read/write path is indicated by placing a period before the - cell name at the pathname's second level (for example, - /afs/.abc.com). For further discussion of the - concept of read/write and read-only paths through the filespace, see the - reference page for the fs mkmount command. -
The V Instruction for Creating and - Mounting a Volume - - - - - - - - - - - - - - - - - - - -
The V instruction in a uss template file creates a - volume on a specified file server machine and partition and creates an entry - for it in the Volume Location Database (VLDB). It mounts the volume at - a location in the AFS file space that becomes the user's home directory, - then designates the directory's owner and sets its access control list - (ACL). -
Only one V instruction can appear in the template file, and one - must appear if the template file contains any instructions at all (is not - empty). All other instructions are optional, except that the template - must include G instructions if the $AUTO variable appears in - it. (The V instruction is not necessarily the first line in - the template. If the template includes the $AUTO variable, then the - G instructions which provide values for the variable must precede - it in the file.) -
The instruction has the following syntax: -
V volume_name server partition quota mount_point owner ACL - --
where -
/vicepa = vicepa = a = 0 - /vicepb = vicepb = b = 1 - --
-
After /vicepz (for which the index is 25) comes -
/vicepaa = vicepaa = aa = 26 - /vicepab = vicepab = ab = 27 - --
and so on through -
/vicepiv = vicepiv = iv = 255 - --
To read in the value from the uss add command's - -partition argument, specify the value $PART. -
Specify the read/write path to the mount point, to avoid the failure that - results from attempting to create a new mount point in a read-only - volume. By convention, the read/write path is indicated by placing a - period before the cell name at the pathname's second level (for example, - /afs/.abc.com). If the $AUTO variable appears - in this field, the directories named by each G instruction possibly - already indicate the read/write path. For further discussion of the - concept of read/write and read-only paths through the filespace, see the - reference page for the fs mkmount command.. -
Note: | If used, the $MTPT variable in this field takes its value from the uss - add command's -mount argument or from the - mount_point field of an add instruction in the bulk input - file. However, subsequent uses of the $MTPT variable (usually in - following D, E, or F instructions) take as - their value the complete contents of this field. - |
Grant all permissions to the new user at least. The appropriate - value is $USER all. -
AFS automatically grants the system:administrators group - all permissions as well. It is not possible to grant any permissions to - the issuer of the uss command. As the last step in account - creation, the uss command interpreter automatically deletes that - user from any ACLs set during the creation process. -
The X Instruction for Running a - Command - - - -
The X instruction in a uss template file runs the - indicated command, which can be a standard UNIX or AFS command. It can - include any variables from the template file, which the uss command - interpreter resolves before passing the command on to the appropriate other - command interpreter. It must be a single line only, however (cannot - contain carriage returns or newline characters). -
Any number of X instructions can appear in the template - file. If an instruction manipulates an element created by another - instruction, it must follow that instruction in the file. -
The instruction has the following syntax: -
X "command" - --
where -
Examples -
The following example A instruction sets a password lifetime of - 254 days, prohibits password reuse, limits the number of consecutive failed - authentication attempts to nine and sets the corresponding locktime to - 25:30 minutes (which is a multiple of 8.5 minutes). The - username is read in from the -user argument to the uss - add command or from the username field in each add - instruction in a bulk input file. -
A $USER 254 noreuse 9 25:30 - --
The following example D instruction creates a directory called - public in a new user's home directory, designates the user as - the directory's owner, and grants him or her all ACL permissions. -
D $MTPT/public 0755 $UID $USER all - --
The following example E instruction creates a file in the - current working directory called - username.etcp. The contents are an entry - suitable for incorporating into the cell's global - /etc/password file. -
E $USER.etcp 0644 root "$USER:X:$UID:10:$NAME:$MTPT:/bin/csh" - --
The following example F instruction, appropriate for the ABC - Corporation cell, copies a prototype .login file into the - user's home directory. -
F $MTPT/.login 0644 $UID /afs/abc.com/common/uss/skel/.login - --
In the following example, the State University cell's administrators - have decided to distribute user home directories evenly into three - directories. They define three G instructions: -
G usr1 - G usr2 - G usr3 - --
and then put the following value in the mount_point field of the - V instruction: -
/afs/stateu.edu/$AUTO/$USER - --
Alternatively, if they include the entire directory pathname in the - G instruction: -
G /afs/stateu.edu/usr1 - G /afs/stateu.edu/usr2 - G /afs/stateu.edu/usr3 - --
then the mount_point field of the V instruction - specifies only the following: -
$AUTO/$USER - --
The following example L instruction creates a hard link between - the files mail and mbox in the user's home - directory. -
L $MTPT/mbox $MTPT/mail - --
The following example S instruction, appropriate for the ABC - Corporation cell, links the file Mail/outgoing in the user's - home directory to the file - /afs/abc.com/common/mail/outgoing. -
S /afs/abc.com/common/mail/outgoing $MTPT/Mail/outgoing - --
The following example V instruction creates a volume called - user.username on the /vicepa partition - of the specified file server machine, assigning it a quota of 3000 kilobyte - blocks. The mount point is under /afs/abc.com/usr and - matches the username (the value of the $USER variable). The user owns - the home directory and has all access rights to it. The instruction - appears on two lines only for legibility; it must appear on a single line - in the template file. -
V user.$USER $SERVER.abc.com /vicepa 3000 \ - /afs/abc.com/usr/$USER $UID $USER all - --
The following example X instruction mounts the backup version of - the user's volume at the OldFiles subdirectory. -
X "fs mkm /afs/abc.com/usr/$USER/OldFiles user.$USER.backup" - --
Related Information -
uss add -
uss bulk -
- -
-
-
- -
-
-
Purpose -
Introduction to AFS commands -
Description -
AFS provides many commands that enable users and system administrators to - use and customize its features. Many of the commands belong to the - following categories, called command suites. -
In addition, there are several commands that do not belong to - suites. -
AFS commands that belong to suites have the following - structure: -
command_suite operation_code -switch <value>[+] [-flag] - --
Together, the command_suite and operation_code - make up the command name. -
The command_suite specifies the group of related commands to - which the command belongs, and indicates which command interpreter and server - process perform the command. AFS has several command suites, including - bos, fs, kas, package, - pts, scout, uss and vos. - Some of these suites have an interactive mode in which the issuer omits the - command_suite portion of the command name. -
The operation_code tells the command interpreter and server - process which action to perform. Most command suites include several - operation codes. The IBM AFS Administration Reference - describes each operation code in detail, and the IBM AFS Administration - Guide describes how to use them in the context of performing - administrative tasks. -
Several AFS commands do not belong to a suite and so their names do not - have a command_suite portion. Their structure is otherwise - similar to the commands in the suites. -
The term option refers to both arguments and flags, which - are described in the following sections. -
One or more arguments can follow the command name. Arguments - specify the entities on which to act while performing the command (for - example, which server machine, server process, or file). To minimize - the potential for error, provide a command's arguments in the order - prescribed in its syntax definition. -
Each argument has two parts, which appear in the indicated order: -
Some arguments accept multiple values, as indicated by trailing plus sign ( - + ) in the command descriptions and online help. How many of - a command's arguments take multiple values, and their ordering with - respect to other arguments, determine when it is acceptable to omit - switches. See Conditions for Omitting Switches. -
Some commands have optional as well as required arguments; the command - descriptions and online help show optional arguments in square brackets ([ - ]). -
Some commands have one or more flags, which specify the manner in which - the command interpreter and server process perform the command, or what kind - of output it produces. Flags are preceded by hyphens like switches, but - they take no values. Although the command descriptions and online help - generally list a command's flags after its arguments, there is no - prescribed order for flags. They can appear anywhere on the command - line following the operation code, except in between the parts of an - argument. Flags are always optional. -
The following example illustrates the different parts - of a command that belongs to an AFS command suite. -
% bos getdate -server fs1.abc.com -file ptserver kaserver - --
where -
Enter each AFS command on a single line (press - <Return> only at the end of the command). Some commands - in this document appear broken across multiple lines, but that is for - legibility only. -
Use a space to separate each element on a command line from its - neighbors. Spaces rather than commas also separate multiple values of - an argument. -
In many cases, the issuer of a command can reduce the amount of typing - necessary by using one or both of the following methods: -
The following sections explain the conditions for omitting or shortening - parts of the command line. It is always acceptable to type a command in - full, with all of its switches and no abbreviations. -
Conditions for Omitting Switches: - It is always acceptable to type the switch part of an - argument, but in many cases it is not necessary. Specifically, switches - can be omitted if the following conditions are met. -
Omitting switches is possible only because there is a prescribed order for - each command's arguments. When the issuer does not include - switches, the command interpreter relies instead on the order of - arguments; it assumes that the first element after the operation code is - the command's first argument, the next element is the command's - second argument, and so on. The important exception is when a - command's final required argument accepts multiple values. In this - case, the command interpreter assumes that the issuer has correctly provided - one value for each argument up through the final one, so any additional values - at the end belong to the final argument. -
The following list describes the rules for omitting switches from the - opposite perspective: an argument's switch must be provided when - any of the following conditions apply. -
An Example of Omitting Switches: - Consider again the example command from An Example Command. -
% bos getdate -server fs1.abc.com -file ptserver kaserver - --
This command has two required arguments: the server machine name - (identified by the -server switch) and binary file name (identified - by the -file switch). The second argument accepts multiple - values. By complying with all three conditions, the issuer can omit the - switches: -
% bos getdate fs1.abc.com ptserver kaserver - --
Because there are no switches, the bos command interpreter - relies on the order of arguments. It assumes that the first element - following the operation code, fs1.abc.com, is the - server machine name, and that the next argument, ptserver, is a - binary file name. Then, because the command's second (and last) - argument accepts multiple values, the command interpreter correctly interprets - kaserver as an additional value for it. -
On the other hand, the following is not acceptable because it violates the - first two conditions in Conditions for Omitting Switches: even though there is only one value per argument, the - arguments do not appear in the prescribed order, and a switch is provided for - one argument but not the other. -
% bos getdate ptserver -server fs1.abc.com - --
This section explains how to abbreviate operation codes, - option names, server machine names, partition names, and cell names. It - is not possible to abbreviate other types of values. -
Abbreviating Operation Codes: - It is acceptable to abbreviate an operation code to the shortest form - that still distinguishes it from the other operation codes in its - suite. -
For example, it is acceptable to shorten bos install to bos - i because there are no other operation codes in the bos - command suite that begin with the letter i. In contrast, - there are several bos operation codes that start with the letter - s, so the abbreviations must be longer to remain unambiguous: -
bos sa for bos salvage -
bos seta for bos setauth -
bos setc for bos setcellname -
bos setr for bos setrestart -
bos sh for bos shutdown -
bos start for bos start -
bos startu for bos startup -
bos stat for bos status -
bos sto for bos stop -
In addition to abbreviations, some operation codes have an - alias, a short form that is not derived by abbreviating the - operation code to its shortest unambiguous form. For example, the alias - for the fs setacl command is fs sa, whereas the shortest - unambiguous abbreviation is fs seta. -
There are two usual reasons an operation code has an alias: -
Even if an operation code has an alias, it is still acceptable to use the - shortest unambiguous form. Thus, the fs setacl command has - three acceptable forms: fs setacl (the full form), fs - seta (the shortest abbreviation), and fs sa (the - alias). -
Abbreviating Switches and Flags: - It is acceptable to shorten a switch or flag to the shortest form that - distinguishes it from the other switches and flags for its operation - code. It is often possible to omit switches entirely, subject to the - conditions listed in Conditions for Omitting Switches. -
Abbreviating Server Machine Names: - AFS server machines must have fully-qualified - Internet-style host names (for example, fs1.abc.com), - but it is not always necessary to type the full name on the command - line. AFS commands accept unambiguous shortened forms, but depend on - the cell's name service (such as the Domain Name Service) or a local host - table to resolve a shortened name to the fully-qualified equivalent when the - command is issued. -
Most commands also accept the dotted decimal form of the machine's IP - address as an identifier. -
Abbreviating Partition Names: - Partitions that house AFS volumes must have names of - the form /vicepx or /vicepxx, where - the variable final portion is one or two lowercase letters. By - convention, the first server partition created on a file server machine is - called /vicepa, the second /vicepb, and so on. - The IBM AFS Quick Beginnings explains how to configure and name a - file server machine's partitions in preparation for storing AFS volumes - on them. -
When issuing AFS commands, you can abbreviate a partition name using any of - the following forms: -
/vicepa = vicepa = a = 0 - /vicepb = vicepb = b = 1 - --
After /vicepz (for which the index is 25) comes -
/vicepaa = vicepaa = aa = 26 - /vicepab = vicepab = ab = 27 - --
and so on through -
/vicepiv = vicepiv = iv = 255 - --
Abbreviating Cell Names: - A cell's full name usually matches its Internet - domain name (such as stateu.edu for the State University or - abc.com for ABC Corporation). Some AFS commands - accept unambiguous shortened forms, usually with respect to the local - /usr/vice/etc/CellServDB file but sometimes depending on the - ability of the local name service to resolve the corresponding domain - name. -
To display online help for AFS commands that belong to - suites, use the help and apropos operation codes. - A -help flag is also available on every almost every AFS - command. -
The online help entry for a command consists of two or three lines: -
If no operation code is specified, the help operation code - displays the first line (short description) for every operation code in the - suite: -
- % command_suite help - --
If the issuer specifies one or more operation codes, the help - operation code displays each command's complete online entry (short - description, alias if any, and syntax): -
- % command_suite help operation_code+ - --
The -help flag displays a command's syntax but not the - short description or alias: -
% command_name -help - --
The apropos operation code displays the short description of any - command in a suite whose operation code or short description includes the - specified keyword: -
% command_suite apropos "<help string>" - --
The following example command displays the complete online help entry for - the fs setacl command: -
- % fs help setacl - fs setacl: set access control list - aliases: sa - Usage: fs setacl -dir <directory>+ -acl <access list entries>+ - [-clear] [-negative] [-id] [-if] [-help] - --
To see only the syntax statement, use the -help flag: -
% fs setacl -help - Usage: fs setacl -dir <directory>+ -acl <access list entries>+ - [-clear] [-negative] [-id] [-if] [-help] - --
In the following example, a user wants to display the quota for her home - volume. She knows that the relevant command belongs to the - fs suite, but cannot remember the operation code. She uses - quota as the keyword: -
- % fs apropos quota - listquota: list volume quota - quota: show volume quota usage - setquota: set volume quota - --
The following illustrates the error message that results if no command name - or short description contains the keyword: -
- % fs apropos "list quota" - Sorry, no commands found - --
Privilege Required -
Many AFS commands require one or more types of administrative - privilege. See the reference page for each command. -
Related Information -
afsd -
backup -
bos -
buserver -
butc -
dlog -
dpass -
fms -
fs -
fstrace -
kas -
kaserver -
kdb -
klog -
knfs -
kpasswd -
kpwvalid -
package -
package -
pagsh -
pts -
ptserver -
runntp -
rxdebug -
salvager -
scout -
sys -
tokens -
unlog -
up -
upclient -
upserver -
uss -
vlserver -
volinfo -
vos -
-
- -
-
-
Purpose -
Initializes the Cache Manager and starts related daemons. -
Synopsis -
afsd [-blocks <1024 byte blocks in cache>] - [-files <files in cache>] - [-rootvol <name of AFS root volume>] - [-stat <number of stat entries>] - [-memcache] [-cachedir <cache directory>] - [-mountdir <mount location>] - [-daemons <number of daemons to use>] - [-nosettime] [-verbose] [-rmtsys] [-debug] - [-chunksize <log(2) of chunk size>] - [-dcache <number of dcache entries>] - [-volumes <number of volume entries>] - [-biods <number of bkg I/O daemons (aix vm)>] - [-prealloc <number of 'small' preallocated blocks>] - [-confdir <configuration directory>] - [-logfile <Place to keep the CM log>] - [-waitclose] [-shutdown] [-enable_peer_stats] - [-enable_process_stats] [-help] --
This command does not use the syntax conventions of the AFS command - suites. Provide the command name and all option names in full. -
Description -
The afsd command initializes the Cache Manager on an AFS client - machine by transferring AFS-related configuration information into kernel - memory and starting several daemons. More specifically, the - afsd command performs the following actions: -
The list of database server machines is transferred into the kernel from - the /usr/vice/etc/CellServDB file. After initialization, use - the fs newcell command to change the kernel-resident list without - having to reboot. -
The second field in the /usr/vice/etc/cacheinfo file is the - source for this name, and the standard value is the /usr/vice/cache - directory. Use the -cachedir argument to override the value - in the cacheinfo file. -
For a memory cache, the following arguments to the afsd command - override the value in the cacheinfo file: -
For satisfactory memory cache performance, the specified value must leave - enough memory free to accommodate all other processes and commands that can - run on the machine. If the value exceeds the amount of memory - available, the afsd program exits without initializing the Cache - Manager and produces the following message on the standard output - stream: -
afsd: memCache allocation failure at number KB - --
where number is how many kilobytes were allocated just before the - failure. -
For a disk cache, use the -blocks argument to the - afsd command to override the value in the cacheinfo - file. The value specified in either way sets an absolute upper limit on - cache size; values provided for other arguments (such as - -dcache and -chunksize) never result in a larger - cache. The afsd program rejects any setting larger than 95% - of the partition size, and exits after generating an error message on the - standard output stream, because the cache implementation itself requires a - small amount of disk space and overfilling the partition can cause the client - machine to panic. -
To change the size of a disk cache after initialization without rebooting, - use the fs setcachesize command; the setting persists until - the afsd command runs again or the fs setcachesize - command is reissued. The fs setcachesize command does not - work for memory caches. -
For a disk cache, a chunk is a Vn file and this - parameter sets the maximum size to which each one can expand; the default - is 64 KB. For a memory cache, each chunk is a collection of contiguous - memory blocks; the default is size is 8 KB. -
To override the default chunk size for either type of cache, use the - -chunksize argument to provide an integer to be used as an exponent - of two; see the Options section for details. For a - memory cache, if total cache size divided by chunk size leaves a remainder, - the afsd program rounds down the number of dcache entries, - resulting in a slightly smaller cache. -
For a disk cache, the /usr/vice/cache/CacheItems file contains - one entry for each Vn file. By default, one half - the number of these entries (but not more that 2,000) are duplicated as dcache - entries in machine memory for quicker access. -
For a memory cache, there is no CacheItems file so all - information about cache chunks must be in memory as dcache entries. - Thus, there is no default number of dcache entries for a memory cache; - instead, the afsd program derives it by dividing the cache size by - the chunk size. -
To set the number of dcache entries, use the -dcache - argument; the specified value can exceed the default limit of - 2,000. Using this argument is not recommended for either type of - cache. Increasing the number of dcache entries for a disk cache - sometimes improves performance (because more entries are retrieved from memory - rather than from disk), but only marginally. Using this argument for a - memory cache requires the issuer to calculate the cache size by multiplying - this value by the chunk size. -
Use the -nosettime flag to prevent the afsd command - from selecting a time standard. This is recommended only on file server - machines that are also acting as clients. File server machines maintain - the correct time using the Network Time Protocol Daemon instead. -
In addition to setting cache configuration parameters, the afsd - program starts the following daemons. (On most system types, these - daemons appear as nameless entries in the output of the UNIX ps - command.) -
The default number of background daemons is two, enough to service at least - five simultaneous users of the machine. To increase the number, use the - -daemons argument. A value greater than six is not generally - necessary. -
Cautions -
Do not use the -shutdown parameter. It does not shutdown - the Cache Manager effectively. Instead, halt Cache Manager activity by - using the standard UNIX umount command to unmount the AFS root - directory (by convention, /afs). The machine must then be - rebooted to reinitialize the Cache Manager. -
Options -
Note: On AIX machines with integrated virtual memory (VM), - the number of VM daemons is set to twice the value of this argument, if it is - provided and the -biods argument is not. If both arguments - are omitted, there are five VM daemons. -
Note: | Provide this argument only on a machine that runs AIX with VM - integration. - |
Examples -
The afsd command is normally included in the machine's AFS - initialization file, rather than typed at the command shell prompt. For - most disk caches, the appropriate form is -
/usr/vice/etc/afsd - --
The following command is appropriate when enabling a machine to act as an - NFS/AFS Translator machine serving more than five users. -
/usr/vice/etc/afsd -daemons 4 -rmtsys - --
The following command initializes a memory cache and sets chunk size to 16 - KB (214). -
/usr/vice/etc/afsd -memcache -chunksize 14 - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
Vn -
cacheinfo - - - - - -
-
- -
-
-
Purpose -
Monitors File Servers and Cache Managers -
Description -
afsmonitor [initcmd] [-config <configuration file>] - [-frequency <poll frequency, in seconds>] - [-output <storage file name>] [-detailed] - [-debug <turn debugging output on to the named file>] - [-fshosts <list of file servers to monitor>+] - [-cmhosts <list of cache managers to monitor>+] - [-buffers <number of buffer slots>] [-help] - - afsmonitor [i] [-co <configuration file>] - [-fr <poll frequency, in seconds>] - [-o <storage file name>] [-det] - [-deb <turn debugging output on to the named file>] - [-fs <list of file servers to monitor>+] - [-cm <list of cache managers to monitor>+] - [-b <number of buffer slots>] [-h] --
Description -
The afsmonitor command initializes a program that gathers and - displays statistics about specified File Server and Cache Manager - operations. It allows the issuer to monitor, from a single location, a - wide range of File Server and Cache Manager operations on any number of - machines in both local and foreign cells. -
There are 271 available File Server statistics and 571 available Cache - Manager statistics, listed in the appendix about afsmonitor - statistics in the IBM AFS Administration Guide. By default, - the command displays all of the relevant statistics for the file server - machines named by the -fshosts argument and the client machines - named by the -cmhosts argument. To limit the display to only - the statistics of interest, list them in the configuration file specified by - the -config argument. In addition, use the configuration - file for the following purposes: -
For a description of the configuration file, see the afsmonitor - Configuration File reference page -
Cautions -
The following software must be accessible to a machine where the - afsmonitor program is running: -
The afsmonitor screens format successfully both on so-called - dumb terminals and in windowing systems that emulate terminals. For the - output to looks its best, the display environment needs to support reverse - video and cursor addressing. Set the TERM environment variable to the - correct terminal type, or to a value that has characteristics similar to the - actual terminal type. The display window or terminal must be at least - 80 columns wide and 12 lines long. - - - -
The afsmonitor program must run in the foreground, and in its - own separate, dedicated window or terminal. The window or terminal is - unavailable for any other activity as long as the afsmonitor - program is running. Any number of instances of the - afsmonitor program can run on a single machine, as long as each - instance runs in its own dedicated window or terminal. Note that it can - take up to three minutes to start an additional instance. -
Options -
Output -
The afsmonitor program displays its data on three screens: -
Fields at the corners of every screen display the following - information: -
Navigating the afsmonitor Display Screens -
As noted, the lower left hand corner of every display screen displays the - names of the commands currently available for moving to alternate screens, - which can either be a different type or display more statistics or machines of - the current type. To execute a command, press the lowercase version of - the first letter in its name. Some commands also have an uppercase - version that has a somewhat different effect, as indicated in the following - list. -
The System Overview Screen -
The System Overview screen appears automatically as the - afsmonitor program initializes. This screen displays the - status of as many File Server and Cache Manager processes as can fit in the - current window; scroll down to access additional information. -
The information on this screen is split into File Server information on the - left and Cache Manager information on the right. The header for each - grouping reports two pieces of information: -
A list of the machines being monitored follows. If there are any - alerts on a machine, the number of them appears in square brackets to the left - of the hostname. If a process failed to respond to the last probe, the - letters PF (probe failure) appear in square brackets to the left of - the hostname. -
The File Servers Screen -
The File Servers screen displays the values collected at the - most recent probe for File Server statistics. -
A summary line at the top of the screen (just below the standard program - version and screen title blocks) specifies the number of monitored File - Servers, the number of alerts, and the number of machines affected by the - alerts. -
The first column always displays the hostnames of the machines running the - monitored File Servers. -
To the right of the hostname column appear as many columns of statistics as - can fit within the current width of the display screen or window; each - column requires space for 10 characters. The name of the statistic - appears at the top of each column. If the File Server on a machine did - not respond to the most recent probe, a pair of dashes (--) appears - in each column. If a value exceeds its configured threshold, it is - highlighted in reverse video. If a value is too large to fit into the - allotted column width, it overflows into the next row in the same - column. -
The Cache Managers Screen -
The Cache Managers screen displays the values collected at the - most recent probe for Cache Manager statistics. -
A summary line at the top of the screen (just below the standard program - version and screen title blocks) specifies the number of monitored Cache - Managers, the number of alerts, and the number of machines affected by the - alerts. -
The first column always displays the hostnames of the machines running the - monitored Cache Managers. -
To the right of the hostname column appear as many columns of statistics as - can fit within the current width of the display screen or window; each - column requires space for 10 characters. The name of the statistic - appears at the top of each column. If the Cache Manager on a machine - did not respond to the most recent probe, a pair of dashes (--) - appears in each column. If a value exceeds its configured threshold, it - is highlighted in reverse video. If a value is too large to fit into - the allotted column width, it overflows into the next row in the same - column. -
Writing to an Output File -
Include the -output argument to name the file into which the - afsmonitor program writes all of the statistics it collects. - The output file can be useful for tracking performance over long periods of - time, and enables the administrator to apply post-processing techniques that - reveal system trends. The AFS distribution does not include any - post-processing programs. -
The output file is in ASCII format and records the same information as the - File Server and Cache Manager display screens. - Each line in the file uses the following format to record the time at which - the afsmonitor program gathered the indicated statistic from the - Cache Manager (CM) or File Server (FS) running on the - machine called host_name. If a probe failed, the error code - -1 appears in the statistic field. -
time host_name CM|FS statistic - --
If the administrator usually reviews the output file manually, rather than - using it as input to an automated analysis program or script, including the - -detail flag formats the data in a more easily readable - form. -
Examples -
For examples of commands, display screens, and configuration files, see the - section about the afsmonitor program in the IBM AFS - Administration Guide. -
Privilege Required -
None -
Related Information -
afsmonitor Configuration File -
fstrace -
scout -
-
- -
-
-
Purpose -
Introduction to the backup command suite -
Description -
The commands in the backup command suite are the administrative - interface to the AFS Backup System. There are several categories of - commands in the suite: -
The backup command interpreter interacts with two other - processes: - - -
Each Tape Coordinator must be registered in the Backup Database and in the - /usr/afs/backup/tapeconfig configuration file on the Tape - Coordinator machine's local disk, and information in the two places must - be consistent for proper Backup System performance. The optional - /usr/afs/backup/CFG_device_name for each Tape Coordinator - records information used to automate its operation. -
In addition to the standard command line interface, the backup - command suite provides an interactive interface, which has several - useful features described on the backup (interactive) reference - page. Three of the commands in the suite are available only in - interactive mode: (backup) jobs, (backup) kill, - and (backup) quit. -
Options -
The following options are available on many commands in the - backup suite. The reference page for each command also lists - them, but they are described here in greater detail. - - - -
-
Do not combine the -cell and -localauth - options. A command on which the -localauth flag is included - always runs in the local cell (as defined in the server machine's local - /usr/afs/etc/ThisCell file), whereas a command on which the - -cell argument is included runs in the specified foreign - cell. -
The -cell argument is not available on commands issued in - interactive mode. The cell defined when the backup command - interpreter enters interactive mode applies to all commands issued during the - interactive session. - -
Use this flag only when issuing a command on a server machine; client - machines do not usually have a /usr/afs/etc/KeyFile file. - The issuer of a command that includes this flag must be logged on to the - server machine as the local superuser root. The flag is - useful for commands invoked by an unattended application program, such as a - process controlled by the UNIX cron utility or by a cron entry in - the machine's /usr/afs/local/BosConfig file. It is also - useful if an administrator is unable to authenticate to AFS but is logged in - as the local superuser root. -
Do not combine the -cell and -localauth - options. A command on which the -localauth flag is included - always runs in the local cell (as defined in the server machine's local - /usr/afs/etc/ThisCell file), whereas a command on which the - -cell argument is included runs in the specified foreign - cell. -
The -localauth argument is not available on commands issued in - interactive mode. The local identity and AFS tokens with which the - backup command interpreter enters interactive mode apply to all - commands issued during the interactive session. -
The backup command interpreter and Tape Coordinator process - communicate via a UDP socket, or port. Before issuing a - backup command that involves reading or writing a tape, the backup - operator must start a butc process that controls the appropriate - tape device and listens for requests sent to its port number. If a - Backup System machine has multiple tape devices attached, they can perform - backup operations simultaneously because each device has its own associated - butc process and port offset number. -
The Backup System associates a tape capacity and file mark size with each - port offset (as defined in the tapeconfig file). For a - compressing tape device, the capacity and file mark values differ for - compression and non-compression modes, so the two modes have distinct port - offset numbers. -
The Backup Database can store up to 58,511 port offsets, so the legal - values for this argument are the integers 0 through - 58510. If the issuer omits the argument, it defaults to - 0. (The limit of 58,511 port offsets results from the fact - that UDP socket numbers are identified by a 16-bit integer, and the lowest - socket number used by the Backup System is 7025. The largest number - that a 16-bit integer can represent is 65,535. Subtracting 7,025 yields - 58,510. The addition of port offset 0 (zero) increases the maximum to - 58,511.) -
Although it is possible to define up to 58,511 port offset numbers for a - cell, it is not possible to run 58,511 tape devices simultaneously, due to the - following limits: -
-
The Backup System does not reserve UDP sockets. If another - application is already using the Tape Coordinator's socket when it tries - to start, the butc process fails and the following error message - appears at the shell prompt: -
bind: Address already in use - rxi_GetUDPSocket: bind failed - --
To issue any backup command that accesses the Backup Database - only, the issuer must be listed in the /usr/afs/etc/UserList file - on every machine where the Backup Server is running. To issue any - backup command that accesses volume data, the issuer must appear in - the UserList file on every Backup Server machine, every Volume - Location (VL) Server machine, and every file server machine that houses - affected volumes. By convention, a common UserList file is - distributed to all database server and file server machines in the - cell. See the chapter on privileged users in the IBM AFS - Administration Guide for more information on this type of - privilege. -
If the -localauth flag is included, the user must instead be - logged on as the local superuser root on the server machine where - the backup command is issued. -
Related Information -
KeyFile -
UserList -
buserver -
butc -
-
- -
-
-
Purpose -
Defines a dump level in the dump hierarchy -
Synopsis -
backup adddump -dump <dump level name>+ [-expires <expiration date>+] - [-localauth] [-cell <cell name>] [-help] - - backup addd -d <dump level name>+ [-e <expiration date>+] [-l] - [-c <cell name>] [-h] --
Description -
The backup adddump command creates one or more dump levels in - the dump hierarchy stored in the Backup Database, and optionally assigns an - expiration date to each one. All of the dump levels in the Backup - Database collectively constitute the dump hierarchy. -
Use the -expires argument to associate an expiration date with - each dump level. When the Backup System subsequently creates a dump at - the dump level, it uses the specified value to derive the dump's - expiration date, which it records on the label of the tape (or backup data - file). The Backup System refuses to overwrite a tape until after the - latest expiration date of any dump that the tape contains, unless the - backup labeltape command is used to relabel the tape. If a - dump level does not have an expiration date, the Backup System treats dumps - created at the level as expired as soon as it creates them. -
(Note that the Backup System does not automatically remove a dump's - record from the Backup Database when the dump reaches its expiration date, but - only if the tape that contains the dump is recycled or relabeled. To - remove expired and other obsolete dump records, use the backup - deletedump command.) -
Define either an absolute or relative expiration date: -
Options -
Dump level names can have any number of levels, but cannot exceed 256 - characters in length, including the slashes. The maximum length for any - single level (the text between slashes) is 28 characters, not including the - preceding slash. -
All alphanumeric characters are allowed in dump level names. Do not - use the period (.), however, because it is the separator - between the volume set name and dump level name in the dump name assigned - automatically by the backup dump command. It is best not to - include other metacharacters either; if using them, enclose them in - double quotes (" ") when issuing the backup adddump - command outside interactive mode. -
-
[at] {NEVER | mm/dd/yyyy [hh:MM] } - --
where the optional word at is followed either by the string - NEVER, which indicates that dumps created at the dump level never - expire, or by a date value with a required portion (mm for month, - dd for day, and yyyy for year) and an optional portion - (hh for hours and MM for minutes). -
Omit the hh:MM portion to use the default of - midnight (00:00 hours), or provide a value in 24-hour format (for - example, 20:30 is 8:30 p.m.). - Valid values for the year range from 1970 to 2037; - higher values are not valid because the latest possible date in the standard - UNIX representation is in February 2038. The command interpreter - automatically reduces later dates to the maximum value. -
Relative expiration dates have the following format: -
[in] [yearsy] [monthsm] [daysd] - --
-
where the optional word in is followed by at least one of a - number of years (maximum 9999) followed by the letter y, - a number of months (maximum 12) followed by the letter - m, or a number of days (maximum 31) followed by the - letter d. If providing more than one of the three, list them - in the indicated order. If the date that results from adding the - relative expiration value to a dump's creation time is later than the - latest possible date in the UNIX time representation, the Backup System - automatically reduces it to that date. -
Note: | A plus sign follows this argument in the command's syntax statement - because it accepts a multiword value which does not need to be enclosed in - double quotes or other delimiters, not because it accepts multiple - dates. Provide only one date (and optionally, time) definition to be - associated with each dump level specified by the -dump - argument. - |
Examples -
The following command defines a full dump called /1999 with a - relative expiration date of one year: -
% backup adddump -dump /1999 -expires in 1y - --
The following command defines an incremental dump called - /sunday1/monday1 with a relative expiration date of 13 days: -
% backup adddump -dump /sunday1/monday1 -expires in 13d - --
The following command defines two dump incremental dump levels, - /Monthly/Week1 and /Monthly/Week2. Their parent, - the full dump level /Monthly, must already exist. The - expiration date for both levels is 12:00 a.m. on 1 January - 2000. -
% backup adddump -dump /Monthly/Week1 /Monthly/Week2 -expires at 01/01/2000 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
-
- -
-
-
Purpose -
Adds a Tape Coordinator entry to the Backup Database -
Synopsis -
backup addhost -tapehost <tape machine name> [-portoffset <TC port offset>] - [-localauth] [-cell <cell name>] [-help] - - backup addh -t <tape machine name> [-p <TC port offset>] - [-l] [-c <cell name>] [-h] --
Description -
The backup addhost command creates a Tape Coordinator entry in - the Backup Database. The entry records -
Each Tape Coordinator must have its own port offset number, and the command - fails if a Backup Database entry already exists for the requested port offset - number. To display existing Tape Coordinator entries, use the - backup listhosts command. -
Options -
Examples -
The following command creates an entry in the Backup Database that assigns - port offset number 4 to a Tape Coordinator running on the machine - backup1.abc.com: -
% backup addhost -tapehost backup1.abc.com -portoffset 4 - --
The following command creates a Backup Database entry that assigns port - offset number 0 to a Tape Coordinator on the machine - backup3.abc.com: -
% backup addhost backup3.abc.com - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
-
- -
-
-
Purpose -
Defines a volume entry in a volume set -
Synopsis -
backup addvolentry -name <volume set name> -server <machine name> - -partition <partition name> - -volumes <volume name (regular expression)> - [-localauth] [-cell <cell name>] [-help] - - backup addvole -n <volume set name> -s <machine name> -p <partition name> - -v <volume name (regular expression)> - [-l] [-c <cell name>] [-h] --
Description -
The backup addvolentry command adds a volume entry definition to - the existing volume set named by the -name argument. A - volume entry definition can match one or more volumes, depending on the - combination of the -server, -partition, and - -volumes arguments. -
For the -server and -partition arguments, provide - either -
For the -volumes argument, specify a combination of alphanumeric - characters and one or more metacharacters to wildcard part or all of the - volume name. The Options section lists the acceptable - metacharacters. -
Cautions -
It is best to issue this command in interactive mode. If issuing it - at the shell prompt, enclose any strings containing metacharacters in double - quotes, or escape the metacharacters with other delimiters, to prevent the - shell from interpreting them. Adding volume entries to a temporary - volume set is possible only within the interactive session in which the volume - set was created. -
Options -
-
Perhaps the most common metacharacter expression is the period followed by - an asterisk (.*). This expression matches any string - of any length, because the period matches any character and the asterisk means - any number of that character. As mentioned, it is the only acceptable - metacharacter expression for the -server and -partition - arguments. In a volume definition it can stand alone (in which case it - matches every volume listed in the VLDB), or can combine with regular - characters. The following example matches any volume name that begins - with the string user and ends with backup: -
user.*backup - --
Examples -
The following command adds a volume entry to the volume set called - sys. The entry matches all volumes on any machine or - partition whose names begin with the string sun4x_56 followed by a - period: -
backup> addvolentry sys .* .* sun4x_56\..* - --
The following command adds a volume entry to the volume set called - fs2, to match all volumes on the /vicepb partition of - file server machine fs2.abc.com. Because it is - issued at the shell prompt, double quotes surround the metacharacters in the - -volumes argument. (The command is shown here on two lines - only for legibility reasons.) -
% backup addvolentry -name fs2 -server fs2.abc.com \ - -partition /vicepb -volumes ".*" - --
The chapter in the IBM AFS Administration Guide about - configuring the AFS Backup System presents additional examples as well as - advice on grouping volumes. -
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
-
- -
-
-
Purpose -
Creates a new (empty) volume set -
Synopsis -
backup addvolset -name <volume set name> [-temporary] - [-localauth] [-cell <cell name>] [-help] - - backup addvols -n <volume set name> [-t] [-l] [-c <cell name>] [-h] --
Description -
The backup addvolset command creates a new volume set, by - default adding it to the Backup Database. It is best that the volume - set's name indicate the volume set's contents; for example, - define the volume entries in the user volume set to match all user - volumes. The volume set name must be unique within the Backup Database - of the local cell. -
After issuing this command, issue the backup addvolentry command - to define the volume entries in the volume set. -
Sometimes it is convenient to create volume sets without recording them - permanently in the Backup Database, for example when using the backup - volsetrestore command to restore a group of volumes that were not - necessarily backed up together. To create a temporary volume - set, include the -temporary flag. A temporary volume set - exists only during the lifetime of the current interactive session, so the - flag is effective only when used during an interactive session (opened by - issuing the backup interactive command). If it is included - when the command is issued at the regular command shell prompt, the command - appears to succeed, but the volume set is not created. As noted, a - temporary volume set ceases to exist when the current interactive session - ends, or use the backup delvolset command to delete it before - that. -
One advantage of temporary volume sets is that the backup - addvolset command, and any backup addvolentry commands - subsequently used to add volume entries to it, complete more quickly than for - regular volume sets, because no records are created in the Backup - Database. -
Options -
Examples -
The following command creates a volume set called sys: -
% backup addvolset sys - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
-
- -
-
-
Purpose -
Displays each help entry containing a keyword string -
Synopsis -
backup apropos -topic <help string> [-help] - - backup ap -t <help string> [-h] --
Description -
The backup apropos command displays the first line of the online - help entry for any backup command that has in its name or short - description the string specified by the -topic argument. -
To display the syntax for a command, use the backup help - command. -
Options -
Output -
The first line of a command's online help entry names it and briefly - describes its function. This command displays the first line for any - backup command where the string specified with the - -topic argument is part of the command name or first line. -
Examples -
The following example lists all backup commands that include the - word tape in their names or short descriptions: -
% backup apropos tape - labeltape: label a tape - readlabel: read the label on tape - scantape: dump information recovery from tape - status: get tape coordinator status - --
Privilege Required -
None -
Related Information -
backup -
-
- -
-
-
Purpose -
Checks the integrity of the Backup Database -
Synopsis -
backup dbverify [-detail] [-localauth] [-cell <cell name>] [-help] - - backup db [-d] [-l] [-c <cell name>] [-h] --
Description -
The backup dbverify command checks the integrity of the Backup - Database. The command's output indicates whether the Backup - Database is damaged (data is corrupted) or not. If the Backup Database - is undamaged, it is safe to continue using it. If it is corrupted, - discontinue any backup operations until it is repaired. -
Cautions -
While this command runs, no other backup operation can access the Backup - Database; the other commands do not run until this command - completes. Avoid issuing this command when other backup operations are - likely to run. The backup savedb command repairs some types - of corruption. -
Options -
Output -
The command displays one of the following two messages: -
The -detail flag provides additional information: -
Examples -
The following command confirms that the Backup Database is undamaged: -
% backup dbverify - Database OK - --
The following command confirms that the Backup Database is undamaged and - that it has no orphan blocks or invalid Tape Coordinator entries. The - Backup Server running on the machine db1.abc.com - checked its copy of the Database. -
% backup dbverify -detail - Database OK - Orphan blocks 0 - Database checker was db1.abc.com - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
-
- -
-
-
Purpose -
Deletes a dump level from the Backup Database -
Synopsis -
backup deldump -dump <dump level name> [-localauth] - [-cell <cell name>] [-help] - - backup deld -d <dump level name> [-l] [-c <cell name>] [-h] --
Description -
The backup deldump command deletes the indicated dump level and - all of its child dump levels from the dump hierarchy in the Backup - Database. Use the backup listdumps command to display the - dump hierarchy. -
Options -
Examples -
The following command deletes the dump level /sunday1/monday1 - from the dump hierarchy, along with any of its child dump levels. -
% backup deldump /sunday1/monday1 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
-
- -
-
-
Purpose -
Deletes one or more dump records from the Backup Database -
Synopsis -
backup deletedump [-dumpid <dump id>+] [-from <date time>+] [-to <date time>+] - [-localauth] [-cell <cell name>] [-help] - - backup dele [-d <dump id>+] [-f <date time>+] [-t <date time>+] - [-l] [-c <cell name>] [-h] --
Description -
The backup deletedump command deletes one or more dump records - from the Backup Database. Either use the -dumpid argument to - specify the dump ID number of one or more dumps, or use the -from - and -to arguments to delete the records for all regular dumps - created during the time period bracketed by the specified values. -
Use this command to remove dump records that are incorrect (possibly - because a dump operation was interrupted or failed), or that correspond to - dumps that are expired or otherwise no longer needed. -
Cautions -
The only way to remove the dump record for an appended dump is to remove - the record for its initial dump, and doing so removes the records for all of - the initial dump's associated appended dumps. -
The only way to remove the record for a Backup Database dump (created with - the backup savedb command) is to specify its dump ID number with - the -dumpid argument. Using the -from and - -to arguments never removes database dump records. -
Removing records of a dump makes it impossible to restore data from the - corresponding tapes or from any dump that refers to the deleted dump as its - parent, directly or indirectly. That is, restore operations must begin - with the full dump and continue with each incremental dump in order. If - the records for a specific dump are removed, it is not possible to restore - data from later incremental dumps unless the deleted records are restored by - running the backup scantape command with the -dbadd - flag. -
If a dump set contains any dumps that were created outside the time range - specified by the -from and -to arguments, the command - does not delete any of the records associated with the dump set, even if some - of them represent dumps created during the time range. -
Options -
Provide either this argument or the -to (and optionally - -from) argument. -
Omit this argument to indicate the default of midnight (00:00 hours) - on 1 January 1970 (UNIX time zero), or provide a date value in the format - mm/dd/yyyy [hh:MM]. The month (mm), - day (dd), and year (yyyy) are required. The hour and - minutes (hh:MM) are optional, but if provided must be - in 24-hour format (for example, the value 14:36 represents - 2:36 p.m.). If omitted, the time defaults to - midnight (00:00 hours). -
The -to argument must be provided along with this one. -
Note: | A plus sign follows this argument in the command's syntax statement - because it accepts a multiword value which does not need to be enclosed in - double quotes or other delimiters, not because it accepts multiple - dates. Provide only one date (and optionally, time) definition. - |
Provide either the value NOW to indicate the current date and - time, or a date value in the same format as for the -from - argument. Valid values for the year (yyyy) range from - 1970 to 2037; higher values are not valid because - the latest possible date in the standard UNIX representation is in February - 2038. The command interpreter automatically reduces any later date to - the maximum value. -
If the time portion (hh:MM) is omitted, it defaults to 59 - seconds after midnight (00:00:59 hours). Similarly, the - backup command interpreter automatically adds 59 seconds to any - time value provided. In both cases, adding 59 seconds compensates for - how the Backup Database and backup dumpinfo command represent dump - creation times in hours and minutes only. For example, the Database - records a creation timestamp of 20:55 for any dump operation - that begins between 20:55:00 and 20:55:59. - Automatically adding 59 seconds to a time thus includes the records for all - dumps created during that minute. -
Provide either this argument, or the -dumpid argument. - This argument is required if the -from argument is provided. -
Caution: Specifying the value NOW for this - argument when the -from argument is omitted deletes all dump - records from the Backup Database (except for Backup Database dump records - created with the backup savedb command). -
Note: | A plus sign follows this argument in the command's syntax statement - because it accepts a multiword value which does not need to be enclosed in - double quotes or other delimiters, not because it accepts multiple - dates. Provide only one date (and optionally, time) definition. - |
Output -
At the conclusion of processing, the output lists the dump IDs of all dump - records deleted in the following format: -
The following dumps were deleted: - dump ID 1 - dump ID 2 - etc. - --
Examples -
The following command deletes the dump record with dump ID 653777462, and - for any appended dumps associated with it: -
% backup deletedump -dumpid 653777462 - The following dumps were deleted: - 653777462 - --
The following command deletes the Backup Database record of all dumps - created between midnight on 1 January 1997 and 23:59:59 hours on - 31 December 1997: -
% backup deletedump -from 01/01/1997 -to 12/31/1997 - The following dumps were deleted: - 598324045 - 598346873 - ... - ... - 653777523 - 653779648 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
-
- -
-
-
Purpose -
Deletes a Tape Coordinator entry from the Backup Database -
Synopsis -
backup delhost -tapehost <tape machine name> [-portoffset <TC port offset>] - [-localauth] [-cell <cell name>] [-help] - - backup delh -t <tape machine name> [-p <TC port offset>] - [-l] [-c <cell name>] [-h] --
Description -
The backup delhost command deletes the indicated Tape - Coordinator entry from the Backup Database. It is then impossible to - submit backup operations to that Tape Coordinator, even if it is still - running. To keep configuration information consistent, also remove the - corresponding entry from the /usr/afs/backup/tapeconfig file on the - Tape Coordinator machine. -
To list the Tape Coordinator machines and port offsets defined in the - Backup Database, issue the backup listhosts command. -
Options -
Examples -
The following command deletes the Backup Database entry for the Tape - Coordinator with port offset 2 on the Tape Coordinator machine - backup3.abc.com: -
% backup delhost -tapehost backup3.abc.com -portoffset 2 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
-
- -
-
-
Purpose -
Deletes a volume entry from a volume set -
Synopsis -
backup delvolentry -name <volume set name> -entry <volume set index> - [-localauth] [-cell <cell name>] [-help] - - backup delvole -n <volume set name> -e <volume set index> - [-l] [-c <cell name>] [-h] --
Description -
The backup delvolentry command deletes the indicated volume - entry from the volume set specified with the -name argument. - Use the -entry argument to identify the volume entry by its index - number. To display the index numbers, use the backup - listvolsets command. -
If there are any remaining volume entries with index numbers higher than - the deleted entry, their indexes are automatically decremented to eliminate - any gaps in the indexing sequence. -
Cautions -
Deleting volume entries from a temporary volume set is possible only within - the interactive session in which the volume set was created. -
Options -
Examples -
The following command deletes the fourth volume entry from the volume set - called sys: -
% backup delvolentry -name sys -entry 4 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
-
- -
-
-
Purpose -
Deletes one or more volume sets from the Backup Database -
Synopsis -
backup delvolset -name <volume set name>+ - [-localauth] [-cell <cell name>] [-help] - - backup delvols -n <volume set name>+ [-l] [-c <cell name>] [-h] --
Description -
The backup delvolset command deletes each volume set named by - the -name argument, and the volume entries each contains, from the - Backup Database. The backup listvolsets command lists the - volume sets (and their volume entries) currently defined in the Backup - Database. -
Cautions -
Deleting a temporary volume set is possible only within the interactive - session in which it was created. Exiting the interactive session also - destroys the temporary volume set automatically. -
Options -
Examples -
The following command deletes the volume set called user and all - volume entries in it: -
% backup delvolset user - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
-
- -
-
-
Purpose -
Restores the entire contents of a partition -
Synopsis -
backup diskrestore -server <machine to restore> - -partition <partition to restore> - [-portoffset <TC port offset>+] - [-newserver <destination machine>] - [-newpartition <destination partition>] - [-extension <new volume name extension>] - [-n] [-localauth] [-cell <cell name>] [-help] - - backup di -s <machine to restore> -pa <partition to restore> - [-po <TC port offset>+] [-news <destination machine>] - [-newp <destination partition>] [-e <new volume name extension>] - [-n] [-l] [-c <cell name>] [-h] --
Description -
The backup diskrestore command restores all of the volumes for - which the Volume Location Database (VLDB) lists a read/write site on the - partition specified with the -server and -partition - arguments. It is useful if a disk or machine failure corrupts or - destroys the data on an entire partition. (To restore any read-only or - backup volumes that resided on the partition, use the vos release - and vos backup commands, respectively, after restoring the - read/write version.) -
If restoring only selected volumes to a single site, it is usually more - efficient to use the backup volrestore command. To restore - multiple volumes to many different sites, use the backup - volsetrestore command. -
(If the FILE YES instruction appears in the - /usr/afs/backup/CFG_device_name file on the Tape - Coordinator machine associated with the specified port offset, then the Backup - System restores data from the backup data file listed for that port offset in - the Tape Coordinator's /usr/afs/backup/tapeconfig file, - instead of from tape. For the sake of clarity, the following text - refers to tapes only, but the Backup System handles backup data files in much - the same way.) -
The Backup System determines whether the read/write or backup version of - each volume was dumped more recently, and restores the dumps of that version, - starting with the most recent full dump. It resets the creation - timestamp of each restored volume to the date and time at which it begins - restoring the volume (the creation timestamp appears in the - Creation field of the output from the vos examine and - vos listvol commands). -
If all of the full and incremental dumps of all relevant volumes were not - written on compatible tape devices, use the -portoffset argument to - list multiple port offset numbers in the order in which the tapes are needed - (first list the port offset for the full dump, second the port offset for the - level 1 incremental dump, and so on). This implies that the full dumps - of all relevant volumes must have been written to a type of tape that the - first Tape Coordinator can read, the level 1 incremental dumps to a type of - tape the second Tape Coordinator can read, and so on. If dumps are on - multiple incompatible tape types, use the backup volrestore command - to restore individual volumes, or the backup volsetrestore command - after defining groups of volumes that were dumped to compatible tape - types. For further discussion, see the IBM AFS Administration - Guide. -
By default, the Backup System restores the contents of the specified - partition to that same partition. To restore the contents to an - alternate site, combine the following options as indicated. The Backup - System removes each volume from the original site, if it still exists, and - records the change of site in the VLDB. -
By default, the Backup System overwrites the contents of existing volumes - with the restored data. To create a new volume to house the restored - data instead, use the -extension argument. The Backup System - creates the new volume at the site designated by the -newserver and - -newpartition arguments if they are used or the -server - and -partition arguments otherwise. It derives the volume - name by adding the extension to the read/write base name listed in the VLDB, - and creates a new VLDB entry. The command does not affect the existing - volume in any way. However, if a volume with the specified extension - also already exists, the command overwrites it. -
To print out a list of the tapes containing the needed dumps, without - actually performing the restore operation, include the -n flag - along with the other options to be used on the actual command. -
The Tape Coordinator's default response to this command is to access - the first tape it needs by invoking the MOUNT instruction in the - local CFG_device_name file, or by prompting the backup - operator to insert the tape if there is no MOUNT - instruction. However, if the AUTOQUERY NO instruction - appears in the CFG_device_name file, or if the issuer of - the butc command included the -noautoquery flag, the - Tape Coordinator instead expects the tape to be in the device already. - If it is not, or is the wrong tape, the Tape Coordinator invokes the - MOUNT instruction or prompts the operator. It also invokes - the MOUNT instruction or prompts for any additional tapes needed to - complete the restore operation; the backup operator must arrange to - provide them. -
Cautions -
If issuing this command to recover data after a disk crash or other damage, - be sure not to issue the vos syncserv command first. Doing - so destroys the VLDB record of the volumes that resided on the - partition. -
Options -
Provide this argument unless the default value of 0 (zero) is appropriate - for all dumps. If 0 is just one of the values in the list, - provide it explicitly in the appropriate order. -
Output -
If a tape error occurs during the restore operation, the Tape Coordinator - displays the following messages: -
Restore operation on volume name failed due to tape error - Do you want to continue (y/n)? - --
where name is the name of the volume that was being restored when - the tape error occurred. Enter the value y to continue the - operation without restoring the indicated volume or the value n to - terminate the operation. In the latter case, the operator can then - attempt to determine the cause of the tape error. -
If the issuer includes the -n flag with the command, the - following string appears at the head of the list of the tapes necessary to - perform the restore operation: -
Tapes needed: - --
Examples -
The following command restores the volumes for which the VLDB lists a - read/write site on the /vicepd partition of the machine - fs5.abc.com. The Tape Coordinator associated - with port offset 3 performs the operation. -
% backup diskrestore -server fs5.abc.com -partition /vicepd -portoffset 3 - --
The following command restores the volumes for which the VLDB lists a - read/write site on the /vicepb partition of the machine - fs1.abc.com to a new site: the - /vicepa partition on the machine - fs3.abc.com. The Tape Coordinator associated - with port offset 0 performs the operation. (The command appears here on - two lines only for legibility.) -
% backup diskrestore -server fs1.abc.com -partition /vicepb \ - -newserver fs3.abc.com -newpartition /vicepa - --
The following command lists the tapes required to restore the volumes for - which the VLDB lists a read/write site on the /vicepm partition of - the machine fs4.abc.com: -
% backup diskrestore -server fs4.abc.com -partition /vicepm -n - Tapes needed: - user.sunday1.1 - user.sunday1.2 - user.monday1.1 - user.tuesday1.1 - user.wednesday1.1 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server or Volume Location (VL) Server is - running, and on every file server machine that houses an affected - volume. If the -localauth flag is included, the issuer must - instead be logged on to a server machine as the local superuser - root. -
Related Information -
backup -
butc -
-
- -
-
-
Purpose -
Creates a dump (dumps a volume set at a particular dump level) -
Synopsis -
backup dump [-volumeset <volume set name>] [-dump <dump level name>] - [-portoffset <TC port offset>] [-at <Date/time to start dump>+] - [-append] [-n] [-file <load file>] - [-localauth] [-cell <cell name>] [-help] - - backup dump [-v <volume set name>] [-d <dump level name>] - [-p <TC port offset>] [-at <Date/time to start dump>+] - [-ap] [-n] [-f <load file>] [-l] [-c <cell name>] [-h] --
Description -
The backup dump command either dumps the volume set specified by - the -volumeset argument at the dump level specified by the - -dump argument and creates a Backup Database dump record about it, - or executes the dump instructions listed in the file named by the - -file argument. The Tape Coordinator indicated by the - -portoffset argument (or on each command in the file) executes the - operation. -
(If the FILE YES instruction appears in the - /usr/afs/backup/CFG_device_name file on the Tape - Coordinator machine associated with the specified port offset, then the Backup - System dumps data to the backup data file listed for that port offset in the - Tape Coordinator's /usr/afs/backup/tapeconfig file, rather - than to tape. For the sake of clarity, the following text refers to - tapes only, but the Backup System handles backup data files in much the same - way.) -
The term dumping refers to copying a collection of data to tape - or a backup data file, and the resulting collection is termed a - dump. The set of tapes that contain one or more dumps is - called a dump set. The first dump in a dump set is its - initial dump, and any dumps subsequently added to the dump set (by - use of the -append argument) are appended dumps. - Creating appended dumps is optional, and appended dumps can be of different - volume sets, and at different dump levels, than the initial dump. -
A full dump, created at a full dump level in the dump hierarchy, - contains all of the data that existed at the time of the dump in the volumes - belonging to the volume set. An incremental dump, created at - an incremental dump level, contains only data that has changed since the - volume set was dumped at the incremental level's parent dump - level (the dump level immediately above the incremental level in the - hierarchy), which can be a full or incremental level. More - specifically, an incremental dump includes only the files and directories that - have modification timestamps later than the clone date of the - volume included at the parent dump level. For backup and read-only - volumes, the clone date is the time at which the volume was cloned from its - read/write source before being included in the parent dump; for - read/write volumes, it represents the time at which the volume was locked for - inclusion in the parent dump. The clone date appears in the clone - date field of the output from the backup volinfo - command. As an example, an incremental dump at the - /full/week1/thursday level includes only files and directories that - have changed since the volume set was dumped at the /full/week1 - level. -
Initiating different types of dump operations -
To initiate a dump operation that is to start as soon as the relevant Tape - Coordinator is available, provide only the -volumeset, - -dump, -portoffset, and optionally -append - options. To schedule a single backup dump command to execute - in the future, also include the -at argument to specify the start - time. -
To append a dump to an existing dump set, include the -append - flag. The Backup System imposes the following conditions on appended - dumps: -
To schedule multiple dump operations, list the operations in the file named - by the -file argument. Optionally include the -at - argument to specify when the backup command interpreter reads the - file; otherwise it reads it immediately. Do not combine the - -file argument with the command's first three arguments or the - -append or -n flags. The commands in the file can - include any of the backup dump command's arguments, including - the -at argument to schedule them to run even later in the - future. -
To generate a list of the volumes included in a dump, without actually - dumping them, combine the -n flag with the options to be used on - the actual command. -
How the Backup System executes a dump operation -
Before beginning a dump operation, the Backup System verifies that there is - a Backup Database entry for the volume set, dump level, and port - offset. If the command is correctly formed and issued in interactive - mode, it is assigned a job number and added to the jobs list. List jobs - in interactive mode by using the (backup) jobs command; - terminate them with the (backup) kill command. -
After obtaining the list of volumes to dump from the Volume Location (VL) - Server, the Backup System sorts the list by site (server and - partition). It groups volumes from the same site together in the dump - to minimize the number of times the operator must change tapes during restore - operations. -
The dependence of an incremental dump on its parent means that a valid - parent dump must already exist for the Backup System to create its child - incremental dump. If the Backup System does not find a record of a dump - created at the immediate parent dump level, it looks in the Backup Database - for a dump created at one level higher in the hierarchy, and so on, up to the - full dump level if necessary. It creates an incremental dump at the - level one below the lowest valid parent dump set that it finds. If it - fails to find even a full dump, it dumps the volume set at the full dump - level. -
If the Backup System is unable to access a volume during a dump operation, - it skips the volume and dumps the remaining volumes from the volume - set. Possible reasons a volume is inaccessible include server machine - or process outages, or that the volume was moved between the time the Volume - Location (VL) Server generated the list of sites for the volume in the volume - set and the time the Backup System actually attempts to dump the data in - it. After the first dumping pass, the Backup System attempts to dump - each volume it skipped. If it still cannot dump a volume and the - ASK NO instruction does not appear in the - CFG_device_name file, it queries the operator as to - whether it needs to attempt to dump the volume again, omit the volume from the - dump, or halt the dump operation altogether. When prompted, the - operator can attempt to solve whatever problem prevented the Backup System - from accessing the volumes. If the ASK NO instruction - appears in the CFG_device_name file, the Backup System - omits the volume from the dump. -
Before scheduling a dump operation, the Backup System verifies that the - date specified by the -at argument is in the future, and checks the - validity of the volume set, dump level and port offset as for a regular dump - operation. It checks the validity of the parameters again just before - actually running the scheduled operation. -
Before writing an initial dump to a tape that does not have a permanent - name on the label, the Backup System checks that the AFS tape name on the - label is acceptable. If desired, disable name checking by including the - NAME_CHECK NO instruction in the - CFG_device_name file. -
If AFS tape name checking is enabled, the Backup System accepts the - following three types of values for the AFS tape name. If the name on - the label does not conform, the Backup System obtains a tape with an - acceptable label by invoking the MOUNT instruction in the - CFG_device_name file or prompting the operator. -
To determine how much data it can write to a tape, the Tape Coordinator - reads the capacity recorded on the tape's label (placed there by - including the -size argument to the backup labeltape - command). If the label's capacity field is empty, the Tape - Coordinator uses the capacity recorded for the specified port offset in the - local tapeconfig file. If the capacity field in the - tapeconfig file is also empty, the Tape Coordinator uses the - maximum capacity of 2 TB. -
During a dump operation, the Tape Coordinator tracks how much data it has - written and stops shortly before it reaches what it believes is the - tape's capacity. If it is in the middle of writing the data for a - volume when it reaches that point, it writes a special marker that indicates - an interrupted volume and continues writing the volume on the next - tape. It can split a volume this way during both an initial and an - appended dump, and the fact that the volume resides on multiple tapes is - automatically recorded in the Backup Database. -
If the tape is actually larger than the expected capacity, then the Tape - Coordinator simply does not use the excess tape. If the tape is smaller - than the expected capacity, the Tape Coordinator can reach the end-of-tape - (EOT) unexpectedly while it is writing data. If the Tape Coordinator is - in the middle of the writing data from a volume, it obtains a new tape and - rewrites the entire contents of the interrupted volume to it. The data - from the volume that was written to the previous tape remains there, but is - never used. -
The Backup System allows recycling of tapes (writing a new dump set over an - old dump set that is no longer needed), but imposes the following - conditions: -
Can't overwrite tape containing the dump in progress - --
Can't overwrite the parent dump parent_name (parent_dump_ID) - --
To recycle a tape before all dumps on it have expired or if the AFS tape - name is wrong, use the backup labeltape command to overwrite the - tape's label and remove all associated tape and dump records from the - Backup Database. -
The Tape Coordinator's default response to this command is to access - the first tape by invoking the MOUNT instruction in the - CFG_device_name file, or by prompting the backup operator - to insert the tape if there is no MOUNT instruction. - However, if the AUTOQUERY NO instruction appears in the - CFG_device_name file, or if the issuer of the - butc command included the -noautoquery flag, the Tape - Coordinator instead expects the tape to be in the device already. If it - is not, the Tape Coordinator invokes the MOUNT instruction or - prompts the operator. It also invokes the MOUNT instruction - or prompts for any additional tapes needed to complete the dump - operation; the issuer must arrange to provide them. -
Cautions -
If a dump operation is interrupted or fails for any reason, data from all - volumes written to tape before the interrupt are valid can be used in a - restore operation. The Backup Database includes an entry for the failed - dump and for each volume that was successfully dumped. See the IBM - AFS Administration Guide for information on dealing with interrupted - dumps. -
If dumping to tape rather than a backup data file, it is best to use only - compatible tape devices (ones that can read the same type of tape). - Using compatible devices greatly simplifies restore operations. The - -portoffset argument to the backup diskrestore and - backup volsetrestore commands accepts multiple port offset numbers, - but the Backup System uses the first listed port offset when restoring all - full dumps, the second port offset when restoring all level 1 dumps, and so - on. At the very least, use compatible tape devices to perform dumps at - each level. If compatible tape devices are not used, the backup - volrestore command must be used to restore one volume at a time. -
Valid (unexpired) administrative tokens must be available to the - backup command interpreter both when it reads the file named by the - -file argument and when it runs each operation listed in the - file. Presumably, the issuer is scheduling dumps for times when no - human operator is present, and so must arrange for valid tokens to be - available on the local machine. One option is to issue all commands (or - run all scripts) on file server machines and use the -localauth - flag on the backup and vos commands. To protect - against improper access to the machine or the tokens, the machine must be - physically secure (perhaps even more protected than a Tape Coordinator machine - monitored by a human operator during operation). Also, if an unattended - dump requires multiple tapes, the operator must properly configure a tape - stacker or jukebox and the device configuration file. -
When the command is issued in regular (non-interactive) mode, the command - shell prompt does not return until the dump operation completes. To - avoid having to open additional connections, issue the command in interactive - mode, especially when including the -at argument to schedule dump - operations. -
Options -
The hour and minutes (hh:MM) are optional, but if provided - must be in 24-hour format (for example, the value 14:36 - represents 2:36 p.m.). If omitted, the time - defaults to midnight (00:00 hours). -
As an example, the value 04/23/1999 20:20 schedules the - command for 8:20 p.m. on 23 April 1999. -
Note: | A plus sign follows this argument in the command's syntax statement - because it accepts a multiword value which does not need to be enclosed in - double quotes or other delimiters, not because it accepts multiple - dates. Provide only one date (and optionally, time) definition. - |
Place each backup dump command on its own line in the indicated - file, using the same syntax as for the command line, but without the word - backup at the start of the line. Each command must include a - value for the -volumeset and -dump arguments, and for - the -portoffset argument unless the default value of 0 is - appropriate. Commands in the file can also include any of the - backup dump command's optional options. In the - following example file, the first command runs as soon as the Backup System - reads the file, whereas the other commands are themselves scheduled; the - specified date and time must be later than the date and time at which the - Backup System reads the file. -
dump user /sunday1/wednesday -port 1 - dump sun4x_56 /sunday1/friday -port 2 -at 04/08/1999 - dump sun4x_55 /sunday1/friday -port 2 -at 04/08/1999 02:00 -append - --
-
Do not combine this argument with the -volumeset, - -dump, -portoffset, -append, or -n - options. -
Output -
The command interpreter first generates a list of the volumes to be - included in the dump by matching the entries in the volume set against the - volumes listed in the Volume Location Database (VLDB). It prints the - list following the header: -
Preparing to dump the following volumes: - --
The following message then indicates that the command interpreter has - passed the dump request to the appropriate Tape Coordinator for - processing: -
Starting dump. - --
If the issuer includes the -n flag, the output is of the - following form: -
Starting dump of volume set 'volume set' (dump set 'dump level') - Total number of volumes : number dumped - Would have dumped the following volumes: - list_of_volumes - --
where list_of_volumes identifies each volume by name and volume ID - number. -
If the Tape Coordinator is unable to access a volume, it prints an error - message in its window and records the error in its log and error files. -
Examples -
The following command dumps the volumes in the volume set called - user at the dump level /full/sunday2/monday. The - issuer places the necessary tapes in the device with port offset 5. -
% backup dump -volumeset user -dump /full/sunday2/monday -portoffset 5 - Preparing to dump the following volumes: - user.jones.backup 387623900 - user.pat.backup 486219245 - user.smith.backup 597315841 - . . - . . - Starting dump. - --
The following command displays the list of volumes to be dumped when the - user dumps the sys_sun volume set at the /full dump - level. -
% backup dump -volumeset sys_sun -dump /full -n - Starting dump of volume set 'sys_sun' (dump set '/full') - Total number of volumes: 24 - Would have dumped the following volumes: - sun4x_56 124857238 - sun4x_56.bin 124857241 - . . - . . - sun4x_55 124857997 - . . - . . - --
The following command schedules a dump of the volumes in the volume set - user at the dump level /sunday2/monday1 for 11:00 - p.m. on 14 June 1999. The appropriate Tape Coordinator - has port offset 0 (zero), so that argument is omitted. -
% backup dump -volumeset user -dump /sunday2/monday1 -at 06/14/1999 23:00 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server or Volume Location (VL) Server is - running, and on every file server machine that houses an affected - volume. If the -localauth flag is included, the issuer must - instead be logged on to a server machine as the local superuser - root. -
Related Information -
backup -
butc -
-
- -
-
-
Purpose -
Displays a dump record from the Backup Database -
Synopsis -
backup dumpinfo [-ndumps <no. of dumps>] [-id <dump id>] - [-verbose] [-localauth] [-cell <cell name>] [-help ] - - backup dumpi [-n <no. of dumps>] [-i <dump id>] - [-v] [-l] [-c <cell name>] [-h] --
Description -
The backup dumpinfo command formats and displays the Backup - Database record for the specified dumps. To specify how many of the - most recent dumps to display, starting with the newest one and going back in - time, use the -ndumps argument. To display more detailed - information about a single dump, use the -id argument. To - display the records for the 10 most recent dumps, omit both the - -ndumps and -id arguments. -
The -verbose flag produces very detailed information that is - useful mostly for debugging purposes. It can be combined only with the - -id argument. -
Options -
Output -
If the -ndumps argument is provided, the output presents the - following information in table form, with a separate line for each dump: -
volume_set_name.dump_level_name (initial_dump_ID) - --
-
where volume_set_name is the name of the volume set, and - dump_level_name is the last element in the dump level pathname at - which the volume set was dumped. -
The initial_dump_ID, if displayed, is the dump ID of the initial - dump in the dump set to which this dump belongs. If there is no value - in parentheses, the dump is the initial dump in a dump set that has no - appended dumps. -
If the -id argument is provided alone, the first line of output - begins with the string Dump and reports information for the entire - dump in the following fields: -
If an XBSA server was the backup medium for the dump (rather than a tape - device or backup data file), the following line appears next: -
Backup Service: XBSA_program: Server: hostname --
where XBSA_program is the name of the XBSA-compliant program and - hostname is the name of the machine on which the program runs. -
Next the output includes an entry for each tape that houses volume data - from the dump. Following the string Tape, the first two - lines of each entry report information about that tape in the following - fields: -
Following another blank line, the tape-specific information concludes with - a table that includes a line for each volume dump on the tape. The - information appears in columns with the following headings: -
If both the -id and -verbose options are provided, - the output is divided into several sections: -
Examples -
The following example displays information about the last five dumps: -
% backup dumpinfo -ndumps 5 - dumpid parentid lv created nt nvols dump name - 924424000 0 0 04/18/1999 04:26 1 22 usr.sun (924424000) - 924685000 924424000 1 04/21/1999 04:56 1 62 usr.wed (924424000) - 924773000 924424000 1 04/22/1999 05:23 1 46 usr.thu (924424000) - 924860000 924424000 1 04/23/1999 05:33 1 58 usr.fri (924424000) - 925033000 0 0 04/25/1999 05:36 2 73 sys.week - --
The following example displays a more detailed record for a single - dump. -
% backup dumpinfo -id 922097346 - Dump: id 922097346, level 0, volumes 1, created Mon Mar 22 05:09:06 1999 - Tape: name monday.user.backup (922097346) - nVolumes 1, created 03/22/1999 05:09 - Pos Clone time Nbytes Volume - 1 03/22/1999 04:43 27787914 user.pat.backup - --
The following example displays even more detailed information about the - dump displayed in the previous example (dump ID 922097346). This - example includes only one exemplar of each type of section (Dump, - Tape, and Volume): -
% backup dumpinfo -id 922097346 -verbose - Dump - ---- - id = 922097346 - Initial id = 0 - Appended id = 922099568 - parent = 0 - level = 0 - flags = 0x0 - volumeSet = user - dump path = /monday1 - name = user.monday1 - created = Mon Mar 22 05:09:06 1999 - nVolumes = 1 - id = 0 - tapeServer = - format= user.monday1.%d - maxTapes = 1 - Start Tape Seq = 1 - name = pat - instance = - cell = - Tape - ---- - tape name = monday.user.backup - AFS tape name = user.monday1.1 - flags = 0x20 - written = Mon Mar 22 05:09:06 1999 - expires = NEVER - kBytes Tape Used = 121 - nMBytes Data = 0 - nBytes Data = 19092 - nFiles = 0 - nVolumes = 1 - seq = 1 - tapeid = 0 - useCount = 1 - dump = 922097346 - Volume - ------ - name = user.pat.backup - flags = 0x18 - id = 536871640 - server = - partition = 0 - nFrags = 1 - position = 2 - clone = Mon Mar 22 04:43:06 1999 - startByte = 0 - nBytes = 19092 - seq = 0 - dump = 922097346 - tape = user.monday1.1 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
-
- -
-
-
Purpose -
Displays the syntax of specified backup commands or lists - functional descriptions of all backup commands -
Synopsis -
backup help [-topic <help string>+] [-help] - - backup h [-t <help string>+] [-h] --
Description -
The backup help command displays the complete online help entry - (short description and syntax statement) for each operation code specified by - the -topic argument. If the -topic argument is - omitted, the output includes the first line (name and short description) of - the online help entry for every backup command. -
To list every backup command whose name or short description - includes a specified keyword, use the backup apropos - command. -
Options -
Output -
The online help entry for each backup command consists of the - following two or three lines: -
Examples -
The following example displays the online help entry for the backup - dump command: -
% backup help dump - backup dump: start dump - Usage: backup dump -volumeset <volume set name> -dump <dump level name> - [-portoffset <TC port offset>] [-at <Date/time to start dump>+] - [-append] [-n] [-file <load file>] [-help] - --
Privilege Required -
None -
Related Information -
backup -
-
- -
-
-
Purpose -
Enters interactive mode -
Synopsis -
-
backup [interactive] [-localauth] [-cell <cell name>] [-help] - - backup [i] [-l] [-c <cell name>] [-h] --
Description -
The backup interactive initiates an interactive session for - issuing backup commands. As indicated in the syntax - statement, the operation code (interactive) is optional. -
Several features of interactive mode distinguish it from regular - mode: -
To exit an interactive session, issue the (backup) quit - command. -
Options -
Examples -
The following example shows how the -localauth flag and - -cell argument do not appear when the help dump - subcommand is issued in interactive mode. -
% backup - backup> help dump - dump: start dump - Usage: dump [-volumeset <volume set name>] [-dump <dump level name>] - [-portoffset <TC port offset>] [-at <Date/time to start dump>+] - [-append ] [-n ] [-file <load file>] [-help ] - --
Privilege Required -
None. However, backup commands that require privilege in - regular mode still require it in interactive mode. -
Related Information -
backup -
butc -
-
- -
-
-
Purpose -
Lists pending and running operations in interactive mode -
Synopsis -
jobs [-help] - - j [-h] --
Description -
The (backup) jobs command lists the job ID number and status of - each backup operation running or pending in the current interactive - session. -
This command can be issued in interactive mode only. If the issuer - of the backup (interactive) command included the - -localauth flag, the -cell argument, or both, those - settings apply to this command also. -
To terminate operations that appear in the output, issue the (backup) - kill command and identify the operation to cancel with the job ID number - from this command's output. -
To check the status of a Tape Coordinator, rather than of a certain - operation, use the backup status command. -
Options -
Output -
The output always includes the expiration date and time of the tokens that - the backup command interpreter is using during the current - interactive session, in the following format: -
date time: TOKEN EXPIRATION --
If the execution date and time specified for a scheduled dump operation is - later than date time, then its individual line (as described in the - following paragraphs) appears below this line to indicate that the current - tokens will not be available to it. -
If the issuer of the backup command included the - -localauth flag when entering interactive mode, the line instead - reads as follows: -
: TOKEN NEVER EXPIRES --
The entry for a scheduled dump operation has the following format: -
Job job_ID: timestamp: dump volume_set dump_level --
where -
The line for a pending or running operation of any other type has the - following format: -
Job job_ID: operation status --
where -
volume_set_name.dump_level_name -
Examples -
The following example shows that two restore operations and one dump - operation are running (presumably on different Tape Coordinators) and that the - backup command interpreter's tokens expire on 22 April 1999 at - 10:45 am: -
backup> jobs - Job 1: Restore, 1306 Kbytes, restore.volume - Job 2: Dump (user.sunday1), 34 Kbytes, volume user.pat.backup - Job 3: Restore, 2498 Kbytes, restore.volume - 04/22/1999 10:45: TOKEN EXPIRATION - --
Privilege Required -
None. However, queuing any operation requires privilege, and it is - possible to issue this command only within the interactive session in which - the jobs are queued. -
Related Information -
backup -
-
- -
-
-
Purpose -
Terminates a pending or running operation -
Synopsis -
kill -id <job ID or dump set name> [-help] - - k -i <job ID or dump set name> [-h] --
Description -
The (backup) kill command dequeues a Backup System operation - that is pending, or terminates an operation that is running, in the current - interactive session. It is available only in interactive mode. - If the issuer of the backup (interactive) command included the - -localauth flag, the -cell argument, or both, then those - settings apply to this command also. -
To terminate a dump operation, specify either the dump name - (volume_set_name.dump_level_name) or its job ID - number, which appears in the output from the (backup) jobs - command. To terminate any other type of operation, provide the job ID - number. -
The effect of terminating an operation depends on the type and current - state of the operation: -
Cautions -
It is best not to issue the (backup) kill command against - restore operations. If the termination signal interrupts a restore - operation as the Backup System is overwriting an existing volume, it is - possible to lose the volume entirely (that is, to lose both the contents of - the volume as it was before the restore and any data that was restored before - the termination signal arrived). The data being restored still exists - on the tape, but some data can be lost permanently. -
Options -
Examples -
The following command terminates the operation with job ID 5: -
backup> kill 5 - --
The following command terminates the dump operation called - user.sunday1: -
backup> kill user.sunday1 - --
Privilege Required -
The issuer must have the privilege required to initiate the operation being - cancelled. Because this command can be issued only within the - interactive session during which the operation was initiated, the required - privilege is essentially guaranteed. -
Related Information -
backup -
-
- -
-
-
Purpose -
Creates the magnetic label on a tape -
Synopsis -
backup labeltape [-name <AFS tape name, defaults to NULL>] - [-size <tape size in Kbytes, defaults to size in tapeconfig>] - [-portoffset <TC port offset>] - [-pname <permanent tape name>] - [-localauth] [-cell <cell name>] [-help] - - backup la [-n <AFS tape name, defaults to NULL>] - [-s <tape size in Kbytes, defaults to size in tapeconfig>] - [-po <TC port offset>] [-pn <permanent tape name>] - [-l] [-c <cell name>] [-h] --
Description -
The backup labeltape command creates a magnetic label, readable - by the Backup System, at the beginning of a tape. The label records the - tape's name (either a permanent name, or an AFS tape - name that reflects the tape's contents in a prescribed format) and - its capacity. -
(If the FILE YES instruction appears in the - /usr/afs/backup/CFG_device_name file on the Tape - Coordinator machine associated with the specified port offset, then the - backup command writes label information to the first 16 KB block in - the backup data file listed for that port offset in the Tape - Coordinator's /usr/afs/backup/tapeconfig file, rather than at - the beginning of a tape. For the sake of clarity, the following text - refers to tapes only, but the Backup System handles backup data files in much - the same way.) -
Relabeling a tape that already contains AFS backup data effectively makes - the data unusable, because the command removes the Backup Database record of - the complete dump set of which the tape is a part. Use this command to - enable recycling of a tape that contains unexpired dumps that are not actually - still needed. -
To write a permanent name on the label, include the -pname - argument to specify a string of up to 32 characters. The permanent name - persists until the -pname argument is again included on the - backup labeltape command, regardless of the tape's contents - and of how often the tape is otherwise relabeled or recycled. Include - this argument or the -name argument, but not both. If this - argument is included, the AFS tape name is set to <NULL>. - The permanent name is set to <NULL> if this argument is omitted - and no permanent name already exists. -
The issuer must ensure that a permanent name is unique among the tapes used - for AFS backup in the cell, because the backup command interpreter - does not verify that another tape does not already have the same permanent - name. When a tape has a permanent name, the Backup System uses it - instead of the AFS tape name in most prompts and when referring to the tape in - output from backup commands. The permanent name appears in - the tape name field of the output from the backup - readlabel command. -
To write an AFS tape name on the label, provide a value for the - -name argument in the required format described in the - Options section. Include the -name argument or - the -pname argument, but not both. If this argument is - omitted, the AFS tape name is set to <NULL>, but the Backup - System automatically assigns the appropriate name when the tape is used in a - future backup dump or backup savedb operation. - The AFS tape name appears in the AFS tape - name field of the output from the backup readlabel and - backup scantape commands. -
The backup command interpreter does not accept the - -name argument if the tape already has a permanent name. To - erase a tape's permanent name, provide a null value to the - -pname argument by issuing the following command: -
% backup labeltape -pname "" - --
To record the tape's capacity on the label, specify a number of - kilobytes as the -size argument. If the argument is omitted - the first time a tape is labeled, the Backup System records the default tape - capacity recorded for the specified port offset in the - /usr/afs/backup/tapeconfig file on the Tape Coordinator - machine. Subsequently, the value in the size field persists until the - -size argument is again included on the backup labeltape - command. -
To determine how much data can be written to a tape during a backup - dump or backup savedb operation, the Tape Coordinator reads - the capacity recorded on the tape's label (or uses the value associated - with its port offset in the /usr/afs/backup/tapeconfig file, if the - tape was never labeled). For further description, see the backup - dump reference page. -
The Tape Coordinator's default response to this command is to access - the tape by invoking the MOUNT instruction in the local - /usr/afs/backup/CFG_device_name file, or by prompting the - backup operator to insert the tape if there is no MOUNT - instruction. However, if the AUTOQUERY NO instruction - appears in the CFG_device_name file, or if the issuer of - the butc command included the -noautoquery flag, the - Tape Coordinator instead expects the tape to be in the device already. - If it is not, the Tape Coordinator invokes the MOUNT instruction or - prompts the operator. -
Options -
volume_set_name.dump_level_name.tape_index - --
for the tape to be acceptable for use in a future backup dump - operation. The volume_set_name must match the volume set name - of the initial dump to be written to the tape, dump_level_name must - match the last element of the dump level pathname at which the volume set will - be dumped, and tape_index indicates the order of the tape in the dump - set (indexing begins with 1). To disable this type of name - checking, include the NAME_CHECK NO instruction in the - CFG_device_name file. -
For the tape to be acceptable for use in a future backup savedb - operation, the value specified for the -name argument must have the - following format: -
Ubik_db_dump.tape_index - --
where tape_index indicates the order of the tape in the set of - tapes that house the Backup Database dump; indexing begins with 1 - (one). -
If this argument is omitted the first time a tape is labeled, the Backup - System records the capacity that is associated with the specified port offset - in the /usr/afs/backup/tapeconfig file on the Tape Coordinator - machine. The value recorded the first time then persists until the - -size argument is provided on a future issuance of the - command. -
Include this argument or the -name argument, but not - both. If this argument is provided, the AFS tape name is set to - <NULL>. If this argument is omitted, any existing - permanent name is retained. -
Examples -
The following command records the AFS tape name - user.monthly.1 on the label of the tape in the device - with port offset 3: -
% backup labeltape -name user.monthly.1 -portoffset 3 - --
The following three commands are equivalent in effect: they all - record a capacity of 2 GB on the label of the tape in the device with port - offset 4. They set the AFS tape name to <NULL> and leave - the permanent name unchanged. -
% backup labeltape -size 2g -portoffset 4 - % backup labeltape -size 2048M -portoffset 4 - % backup labeltape -size 2097152 -portoffset 4 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
butc -
-
- -
-
-
Displays the dump hierarchy from the Backup Database -
Synopsis -
backup listdumps [-localauth] [-cell <cell name>] [-help] - - backup listd [-l] [-c <cell name>] [-h] --
Description -
The backup listdumps command displays the dump hierarchy from - the Backup Database. -
Options -
Output -
The output displays the complete dump hierarchy and indicates the - relationship between full and incremental dump levels. Full dump levels - appear at the left margin. The hierarchy can include more than one full - dump level; each one defines a subhierarchy of dump levels that can be - used for dumping different volume sets. -
Incremental dump levels appear below and indented to the right of their - parent dump levels, which can be either full or incremental. Since - multiple incremental dump levels can share the same parent, an incremental - dump level is not always directly below its parent; the amount of - indentation indicates the parent/child relationship. -
If a dump level has an associated expiration date, it appears along with - the level name. Absolute expiration dates appear in the format -
dump_level expires at day month date time year - --
and relative expiration dates in the format -
dump_level expires in {yearsy | monthsm | daysd} - --
to indicate the number of years, months, days, or combination of the three - after creation a dump expires when created at this level. -
Examples -
The following example depicts six dump hierarchies. The expiration - date for all incremental dump levels is 13 days so that the corresponding - tapes can be recycled two weeks after their creation. The expiration - dates for all full dump levels is 27 days so that the corresponding tapes can - be recycled four weeks after their creation. -
% backup listdumps - /week1 expires in 27d - /tuesday expires in 13d - /thursday expires in 13d - /sunday expires in 13d - /tuesday expires in 13d - /thursday expires in 13d - /week3 expires in 27d - /tuesday expires in 13d - /thursday expires in 13d - /sunday expires in 13d - /tuesday expires in 13d - /thursday expires in 13d - /sunday1 expires in 27d - /monday1 expires in 13d - /tuesday1 expires in 13d - /wednesday1 expires in 13d - /thursday1 expires in 13d - /friday1 expires in 13d - /sunday2 expires in 27d - /monday2 expires in 13d - /tuesday2 expires in 13d - /wednesday2 expires in 13d - /thursday2 expires in 13d - /friday2 expires in 13d - /sunday3 expires in 27d - /monday1 expires in 13d - /tuesday1 expires in 13d - /wednesday1 expires in 13d - /thursday1 expires in 13d - /friday1 expires in 13d - /sunday4 expires in 27d - /monday2 expires in 13d - /tuesday2 expires in 13d - /wednesday2 expires in 13d - /thursday2 expires in 13d - /friday2 expires in 13d - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
-
- -
-
-
Lists Tape Coordinator machines registered in the Backup Database -
Synopsis -
backup listhosts [-localauth] [-cell <cell name>] [-help] - - backup listh [-l] [-c <cell name>] [-h] --
Description -
The backup listhosts command displays the Backup Database record - of the port offset numbers defined for Tape Coordinator machines. A - Tape Coordinator must have an entry in the list to be available for backup - operations. -
The existence of an entry does not necessarily indicate that the Tape - Coordinator process (butc) is currently running at that port - offset. To check, issue the backup status command. -
Options -
Output -
After a Tape hosts: header, the output reports - two things about each Tape Coordinator currently defined in the Backup - Database: -
The Tape Coordinators appear in the order in which they were added to the - Backup Database. -
Examples -
The following example shows the result of the command in the ABC - Corporation cell: -
% backup listhosts - Tape hosts: - Host backup1.abc.com, port offset 0 - Host backup1.abc.com, port offset 1 - Host backup3.abc.com, port offset 4 - Host backup2.abc.com, port offset 3 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
-
- -
-
-
Purpose -
Lists volume set entries from the Backup Database -
Synopsis -
backup listvolsets [-name <volume set name>] - [-localauth] [-cell <cell name>] [-help] - - backup listv [-n <volume set name>] [-l] [-c <cell name>] [-h] --
Description -
The backup listvolsets command displays the Backup Database - records for either -
Options -
Output -
The entry for each volume set begins with the Volume set header - and the volume set's name. A temporary volume set's name is - followed by the string (temporary). Each volume entry - follows on a separate line, indicating the entry's index number and the - server, partition, and volume names it matches. The output uses the - metacharacter notation described on the backup addvolentry - reference page. Use the index number to identify volume entries when - deleting them with the backup delvolentry command. -
Examples -
The following example shows the volume entries in the three volume sets - currently defined in the Backup Database: -
% backup listvolsets - Volume set user: - Entry 1: server .*, partition .*, volumes: user.*\.backup - Volume set sun - Entry 1: server .*, partition .*, volumes: sun4x_55\..* - Entry 2: server .*, partition .*, volumes: sun4x_56\..* - Volume set rs - Entry 1: server .*, partition .*, volumes: rs_aix42\..* - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
-
- -
-
-
Purpose -
Leaves interactive mode -
Synopsis -
quit [-help] - - q [-h] - --
Description -
The (backup) quit command exits interactive mode, returning the - issuer to the regular shell prompt at which the backup or - backup interactive command was issued to enter interactive - mode. The command has no effect when issued outside interactive - mode. Issuing the <Ctrl-d> command also exits interactive - mode. -
Cautions -
To exit interactive mode, all jobs must be completed. Use the - (backup) jobs command to list any jobs currently pending or - executing, and the (backup) kill command to terminate them as - necessary. -
Options -
Examples -
The following command exits interactive mode: -
backup> quit - % - --
Privilege Required -
None -
Related Information -
backup -
-
- -
-
-
Purpose -
Reads and displays a tape's label -
Synopsis -
backup readlabel [-portoffset <TC port offset>] - [-localauth] [-cell <cell name>] [-help] - - backup rea [-p <TC port offset>] [-l] [-c <cell name>] [-h] --
Description -
The backup readlabel command displays information from the - magnetic tape label of a tape. The information includes the tape's - name (either a permanent name, or an AFS tape name that - reflects the tape's contents in a prescribed format) and its - capacity. -
If the FILE YES instruction appears in the - /usr/afs/backup/CFG_device_name file associated with the - specified port offset, then the backup readlabel command reads the - label information from the first 16 KB block in the backup data file listed - for that port offset in the Tape Coordinator's - /usr/afs/backup/tapeconfig file, rather than from the beginning of - a tape. -
The Tape Coordinator's default response to this command is to access - the tape by invoking the MOUNT instruction in the local - /usr/afs/backup/CFG_device_name file, or by prompting the - backup operator to insert the tape if there is no MOUNT - instruction. However, if the AUTOQUERY NO instruction - appears in the CFG_device_name file, or if the issuer of - the butc command included the -noautoquery flag, the - Tape Coordinator instead expects the tape to be in the device already. - If it is not, the Tape Coordinator invokes the MOUNT instruction or - prompts the operator. -
Options -
Output -
Output from this command appears in both the shell window where the command - is issued, and in the Tape Coordinator window. -
If the tape is unlabeled or if the specified tape device is empty, the - output reads -
Failed to read tape label. - --
Otherwise, the output in the shell window has the following format: -
Tape read was labelled: tape name (dump id) - size: size Kbytes - --
where tape name is the permanent name if the tape has one, or the - AFS tape name otherwise. The dump ID is dump ID of the initial - dump on the tape, and size is the recorded capacity of the tape in - kilobytes. -
The output in the Tape Coordinator windows is bounded by an underlined - Tape label header at the top, and the following string - at the bottom: -
-- End of tape label -- - --
In between are lines reporting the following information: -
The message ReadLabel: Finished indicates the completion - of the output. -
Examples -
The following example shows the output for the tape with permanent name - oct.guest.dump and capacity 2 MB, expressed in - kilobyte units (2097152 equals 2 times 10242). -
% backup readlabel -portoffset 6 - Tape read was labelled: oct.guest.dump (907215000) - size: 2097152 Kbytes - --
The output in the Tape Coordinator window reads: -
Tape label - ---------- - tape name = oct.guest.dump - AFS tape name = guests.monthly.3 - creationTime = Thu Oct 1 00:10:00 1998 - cell = abc.com - size = 2097152 Kbytes - dump path = /monthly - dump id = 907215000 - useCount = 5 - ---- End of tape label ---- - --
The following example is for a tape that does not have a permanent - tape. -
% backup readlabel -portoffset 6 - Tape read was labelled: guests.monthly.2 (909899900) - size: 2097152 Kbytes - --
The output in the Tape Coordinator window reads: -
Tape label - ---------- - tape name = <NULL> - AFS tape name = guests.monthly.2 - creationTime = Sun Nov 1 00:58:20 1998 - cell = abc.com - size = 2097152 Kbytes - dump path = /monthly - dump id = 909899900 - useCount = 1 - ---- End of tape label ---- - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
butc -
-
- -
-
-
Purpose -
Restores a saved copy of the Backup Database -
Synopsis -
backup restoredb [-portoffset <TC port offset>] - [-localauth] [-cell <cell name>] [-help] - - backup res [-p <TC port offset>] [-l] [-c <cell name>] [-h] --
Description -
The backup restoredb command restores to the Backup Server - machine's local disk a version of the Backup Database previously written - to tape by using the backup savedb command. -
(If the FILE YES instruction appears in the - /usr/afs/backup/CFG_device_name file associated with the - specified port offset, then the backup restoredb command restores - data from the backup data file listed for that port offset in the Tape - Coordinator's /usr/afs/backup/tapeconfig file, instead of from - tape. For the sake of clarity, the following text refers to tapes only, - but the Backup System handles backup data files in much the same way.) -
The most common reason to run this command is to replace a corrupted or - otherwise damaged Backup Database; use the backup dbverify - command to determine the database's status. The command can also - be used to restore records that were removed from the database when the - -archive argument was included on a previous backup - savedb command. -
The command completely overwrites the existing Backup Database records for - volume sets, Tape Coordinators, and the dump hierarchy with the corresponding - information from the saved version. It does not overwrite existing dump - records, but instead interleaves the records from the copy being - restored. If both the existing database (on the Backup Server - machine's disk) and the copy being restored include a record about the - same dump, the Backup System retains the one in the existing database. -
The Tape Coordinator's default response to this command is to access - the first tape it needs by invoking the MOUNT instruction in the - local /usr/afs/backup/CFG_device_name file, or by - prompting the backup operator to insert the tape if there is no - MOUNT instruction. However, if the AUTOQUERY NO - instruction appears in the CFG_device_name file, or if the - issuer of the butc command included the -noautoquery - flag, the Tape Coordinator instead expects the tape to be in the device - already. If it is not, or is the wrong tape, the Tape Coordinator - invokes the MOUNT instruction or prompts the operator. It - also invokes the MOUNT instruction or prompts for any additional - tapes needed to complete the restore operation; the backup operator must - arrange to provide them. -
Cautions -
If the database is corrupted, do not attempt to restore a saved database on - top of it. Instead, use the instructions for repairing a corrupted - database in the IBM AFS Administration Guide chapter about - performing backup operations. -
Options -
Examples -
The following example shows the Backup Database being restored from the - Tape Coordinator with port offset 0: -
% backup restoredb - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
butc -
IBM AFS Administration Guide -
-
- -
-
-
Purpose -
Creates a saved copy of the Backup Database -
Synopsis -
backup savedb [-portoffset <TC port offset>] [-archive <date time>+] - [-localauth] [-cell <cell name>] [-help] - - backup sa [-p <TC port offset>] [-a <date time>+] - [-l] [-c <cell name>] [-h] --
Description -
The backup savedb command creates a backup copy of the entire - Backup Database and writes it to the tape in the device controlled by the Tape - Coordinator indicated with the -portoffset argument. If the - database is damaged (as reported by the backup dbverify command), - this command repairs as much of the corruption as possible as it creates the - saved copy. The Backup Server creates a dump record for the saved - database in the Backup Database (but in the disk version of the database only, - not in the version written to tape). -
If the FILE YES instruction appears in the - /usr/afs/backup/CFG_device_name file associated with the - specified port offset, then the backup savedb command dumps the - database copy to the backup data file listed for that port offset in the Tape - Coordinator's /usr/afs/backup/tapeconfig file, instead of to - tape. For the sake of clarity, the following text refers to tapes only, - but the Backup System handles backup data files in much the same way. -
If the -archive flag is provided, after writing the saved copy - of the database the Backup System truncates the copy of the database on disk - by deleting volume dump records with timestamps prior to the specified date - and time (it does not delete the dump records created by previous backup - savedb commands, however). -
If the tape to which the database copy is written has an AFS tape name, it - must be Ubik_db_dump.1 or <NULL>. Any - permanent name is acceptable. -
The Tape Coordinator's default response to this command is to access - the first tape by invoking the MOUNT instruction in the local - /usr/afs/backup/CFG_device_name file, or by prompting the - backup operator to insert the tape if there is no MOUNT - instruction. However, if the AUTOQUERY NO instruction - appears in the CFG_device_name file, or if the issuer of - the butc command included the -noautoquery flag, the - Tape Coordinator instead expects the tape to be in the device already. - If it is not, the Tape Coordinator invokes the MOUNT instruction or - prompts the operator. It also invokes the MOUNT instruction - or prompts for any additional tapes needed to complete the operation; the - backup operator must arrange to provide them. -
Options -
Provide one of two values: -
The hour and minutes (hh:MM) are optional, but if - provided must be in 24-hour format (for example, the value - 14:36 represents 2:36 p.m.). If - omitted, the time defaults to 59 seconds after midnight (00:00:59 - hours). Similarly, the backup command interpreter - automatically adds 59 seconds to any time value provided. In both - cases, adding 59 seconds compensates for how the Backup Database and - backup dumpinfo command represent dump creation times in hours and - minutes only. That is, the Database records a creation timestamp of - 20:55 for any dump created between 20:55:00 and - 20:55:59. Automatically adding 59 seconds to a time thus - includes the records for all dumps created during that minute. -
Note: | A plus sign follows this argument in the command's syntax statement - because it accepts a multiword value which does not need to be enclosed in - double quotes or other delimiters, not because it accepts multiple - dates. Provide only one date (and optionally, time) definition. - |
Examples -
The following example writes a copy of the Backup Database to the tape - device controlled by the Tape Coordinator with port offset 1: -
% backup savedb -portoffset 1 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
butc -
-
- -
-
-
Purpose -
Extracts dump information from a tape -
Synopsis -
backup scantape [-dbadd] [-portoffset <TC port offset>] - [-localauth] [-cell <cell name>] [-help] - - backup sc [-d] [-p <TC port offset>] [-l] [-c <cell name>] [-help] --
Description -
The backup scantape command extracts information from the dump - labels and volume headers on the tape in the device controlled by the Tape - Coordinator indicated by the -portoffset argument. The Tape - Coordinator displays the information for each volume in its window as soon as - it extracts it (rather than waiting until it has scanned the entire - tape). -
(If the FILE YES instruction appears in the - /usr/afs/backup/CFG_device_name file associated with the - specified port offset, then the backup scantape command extracts - dump information from the backup data file named in that port offset's - entry in the /usr/afs/backup/tapeconfig file on the Tape - Coordinator machine, rather than from a tape. For the sake of clarity, - the following text refers to tapes only, but the Backup System handles backup - data files in much the same way.) -
If the -dbadd flag is provided, the backup scantape - command creates new dump and volume records in the Backup Database for the - scanned information. However, if it finds that a record already exists - in the database for the same dump, it terminates the scanning - operation. -
The scanning operation works only on tapes containing volume data. - The command fails with an error message if the tape contains a copy of the - Backup Database (was created with the backup savedb command, or has - the AFS tape name Ubik_db_dump.1). -
The Tape Coordinator's default response to this command is to access - the tape by invoking the MOUNT instruction in the - CFG_device_name file, or by prompting the backup operator - to insert the tape if there is no MOUNT instruction. - However, if the AUTOQUERY NO instruction appears in the - CFG_device_name file, or if the issuer of the - butc command included the -noautoquery flag, the Tape - Coordinator instead expects the tape to be in the device already. If it - is not, the Tape Coordinator invokes the MOUNT instruction or - prompts the operator. -
To terminate a tape scanning operation in interactive mode, issue the - (backup) kill command. In noninteractive mode, the only - choice is to use a termination signal such as <Ctrl-c> to halt - the Tape Coordinator completely. -
Cautions -
A scanning operation does not have to begin with the first tape in a dump - set, but the Backup System can process tapes only in sequential order after - the initial tape provided. The Tape Coordinator automatically requests - any subsequent tapes by invoking the MOUNT instruction in the local - /usr/afs/backup/CFG_device_name file, or by prompting the - operator if there is no MOUNT instruction. -
The Tape Coordinator's success in scanning a tape that is corrupted or - damaged depends on the extent of the damage and what type of data is - corrupted. It can almost always scan the tape successfully up to the - point of damage. If the damage is minor, the Tape Coordinator can - usually skip over it and scan the rest of the tape, but more major damage can - prevent further scanning. Because a scanning operation can start on any - tape in a dump set, damage on one tape does not prevent scanning of the others - in the dump set. However, it is possible to scan either the tapes that - precede the damaged one or the ones that follow it, but not both. -
If a tape is relabeled with the backup labeltape command, it is - not possible to recover data from it for the purposes of rebuilding the Backup - Database. -
If the -dbadd flag is included on the command, it is best not to - terminate the tape scanning operation before it completes (for example, by - issuing the (backup) kill command in interactive mode). The - Backup System writes a new record in the Backup Database for each dump as soon - as it scans the relevant information on the tape, and so it possibly has - already written new records. If the operator wants to rerun the - scanning operation, he or she must locate and remove the records created - during the terminated operation: the second operation exits - automatically if it finds that a record that it needs to create already - exists. -
If the -dbadd flag is included and the first tape provided is - not the first tape in the dump set, the following restrictions apply: -
Options -
Output -
For every dump on a tape, the backup scantape command displays - in the Tape Coordinator window the dump label and the volume header of each - volume in the dump. If a dump spans more than one tape, the dump label - does not repeat at the beginning of subsequent tapes. -
A dump label contains the following fields, which are the same as in the - output from the backup readlabel command: -
The volume header contains the following fields: -
The message Scantape: Finished indicates the completion of - the output. -
In normal circumstances, the Backup System writes a marker to indicate that - a volume is the last one on a tape, or that the volume continues on the next - tape. However, if a backup operation terminated abnormally (for - example, because the operator terminated the Tape Coordinator by issuing the - <Ctrl-c> command during the operation), then there is no such - marker. Some very early versions of the Backup System also did not - write these markers. If a tape does not conclude with one of the - expected markers, the Tape Coordinator cannot determine if there is a - subsequent tape in the dump set and so generates the following message in its - window: -
Are there more tapes? (y/n) - --
Examples -
The following example shows the output for the first two volumes on a tape - in the device with port offset 0: -
% backup scantape - Dump label - ---------- - tape name = monthly_guest - AFS tape name = guests.monthly.3 - creationTime = Mon Feb 1 04:06:40 1999 - cell = abc.com - size = 2150000 Kbytes - dump path = /monthly - dump id = 917860000 - useCount = 44 - -- End of dump label -- - -- volume -- - volume name: user.guest10.backup - volume ID 1937573829 - dumpSetName: guests.monthly - dumpID 917860000 - level 0 - parentID 0 - endTime 0 - clonedate Mon Feb 1 03:03:23 1999 - -- volume -- - volume name: user.guest11.backup - volume ID 1938519386 - dumpSetName: guests.monthly - dumpID 917860000 - level 0 - parentID 0 - endTime 0 - clonedate Mon Feb 1 03:05:15 1999 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
butc -
-
- -
-
-
Purpose -
Sets the expiration date for existing dump levels. -
Synopsis -
backup setexp -dump <dump level name>+ [-expires <expiration date>+] - [-localauth] [-cell <cell name>] [-help] - - backup se -d <dump level name>+ [-e <expiration date>+] - [-l] [-c <cell name>] [-h] --
Description -
The backup setexp command sets or changes the expiration date - associated with each specified dump level, which must already exist in the - dump hierarchy. -
Use the -expires argument to associate an expiration date with - each dump level. When the Backup System subsequently creates a dump at - the dump level, it uses the specified value to derive the dump's - expiration date, which it records on the label of the tape (or backup data - file). The Backup System refuses to overwrite a tape until after the - latest expiration date of any dump that the tape contains, unless the - backup labeltape command is used to relabel the tape. If a - dump level does not have an expiration date, the Backup System treats dumps - created at the level as expired as soon as it creates them. -
(Note that the Backup System does not automatically remove a dump's - record from the Backup Database when the dump reaches its expiration date, but - only if the tape that contains the dump is recycled or relabeled. To - remove expired and other obsolete dump records, use the backup - deletedump command.) -
Define either an absolute or relative expiration date: -
If the command is used to change an existing expiration date associated - with a dump level, the new date applies only to dumps created after the - change. Existing dumps retain the expiration date assigned at the time - they were created. -
Options -
-
[at] {NEVER | mm/dd/yyyy [hh:MM] } - --
where the optional word at is followed either by the string - NEVER, which indicates that dumps created at the dump level never - expire, or by a date value with a required portion (mm for month, - dd for day, and yyyy for year) and an optional portion - (hh for hours and MM for minutes). -
Omit the hh:MM portion to use the default of - midnight (00:00 hours), or provide a value in 24-hour format (for - example, 20:30 is 8:30 p.m.). - Valid values for the year range from 1970 to 2037; - higher values are not valid because the latest possible date in the standard - UNIX representation is in February 2038. The command interpreter - automatically reduces later dates to the maximum value. -
Relative expiration dates have the following format: -
[in] [yearsy] [monthsm] [daysd] - --
-
where the optional word in is followed by at least one of a - number of years (maximum 9999) followed by the letter y, - a number of months (maximum 12) followed by the letter - m, or a number of days (maximum 31) followed by the - letter d. If providing more than one of the three, list them - in the indicated order. If the date that results from adding the - relative expiration value to a dump's creation time is later than the - latest possible date in the UNIX time representation, the Backup System - automatically reduces it to that date. -
Note: | A plus sign follows this argument in the command's syntax statement - because it accepts a multiword value which does not need to be enclosed in - double quotes or other delimiters, not because it accepts multiple - dates. Provide only one date (and optionally, time) definition to be - associated with each dump level specified by the -dump - argument. - |
Examples -
The following example associates an absolute expiration date of 10:00 - p.m. on 31 December 1999 with the dump level - /1998/december: -
% backup setexp -dump /1998/december -expires at 12/31/1999 22:00 - --
The following example associates a relative expiration date of 7 days with - the two dump levels /monthly/week1 and - /monthly/week2: -
% backup setexp -dump /monthly/week1 /monthly/week -expires 7d - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
-
- -
-
-
Purpose -
Reports a Tape Coordinator's status -
Synopsis -
backup status [-portoffset <TC port offset>] - [-localauth] [-cell <cell name>] [-help] - - backup st [-p <TC port offset>] [-l] [-c <cell name>] [-h] --
Description -
The backup status command displays which operation, if any, the - indicated Tape Coordinator is currently executing. -
Options -
Output -
The following message indicates that the Tape Coordinator is not currently - performing an operation: -
Tape coordinator is idle --
Otherwise, the output includes a message of the following format for each - running or pending operation: -
Task task_ID: operation: status --
where -
If the Tape Coordinator is communicating with an XBSA server (a third-party - backup utility that implements the Open Group's Backup Service API - [XBSA]), the following message appears last in the output: -
XBSA_program Tape coordinator --
where XBSA_program is the name of the XBSA-compliant - program. -
Examples -
The following example shows that the Tape Coordinator with port offset 4 - has so far dumped about 1.5 MB of data for the current dump operation, - and is currently dumping the volume named - user.pat.backup: -
% backup status -portoffset 4 - Task 4001: Dump: 1520 Kbytes transferred, volume user.pat.backup - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server is running, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
backup -
butc -
-
- -
-
-
Purpose -
Displays a volume's dump history from the Backup Database -
Synopsis -
backup volinfo -volume <volume name> - [-localauth] [-cell <cell name>] [-help] - - backup voli -v <volume name> [-l] [-c <cell name>] [-h] --
Description -
The backup volinfo command displays a dump history of the - specified volume, reporting information such as the date on which the volume - was dumped and the tapes that contain it. Include the - .backup extension on the volume name if the backup version - of the volume was dumped. -
Options -
Output -
The output includes a line for each Backup Database dump record that - mentions the specified volume, order from most to least recent. The - output for each record appears in a table with six columns: -
Examples -
The following example shows part of the dump history of the Backup volume - user.smith.backup: -
% backup volinfo -volume user.smith.backup - DumpID lvl parentID creation date clone date tape name - 924600000 1 924427600 04/20/1999 05:20 04/20/1999 05:01 user_incr_2 (924514392) - 924514392 1 924427600 04/19/1999 05:33 04/19/1999 05:08 user_incr_2 - 924427600 0 0 04/18/1999 05:26 04/18/1999 04:58 user_full_6 - . . . . . . . . - . . . . . . . . - --
Privilege Required -
None -
Related Information -
backup -
-
- -
-
-
Purpose -
Restores one or more volumes -
Synopsis -
backup volrestore -server <destination machine> - -partition <destination partition> - -volume <volume(s) to restore>+ - [-extension <new volume name extension>] - [-date <date from which to restore>+] - [-portoffset <TC port offsets>+] [-n] - [-localauth] [-cell <cell name>] [-help] - - backup volr -s <destination machine> -pa <destination partition> - -v <volume(s) to restore>+ [-e <new volume name extension>] - [-d <date from which to restore>+] [-po <TC port offsets>+] - [-n] [-l] [-c <cell name>] [-h] --
Description -
The backup volrestore command restores the contents of one or - more volumes to the site indicated by the -server and - -partition arguments. Use the command either to overwrite - the contents of existing volumes with the restored data or to create new - volumes while retaining the existing ones. The specified site does not - have to be the current site for the volumes. -
(If the FILE YES instruction appears in the - /usr/afs/backup/CFG_device_name file associated with the - specified port offset, then the backup volrestore command restores - data from the backup data file listed for that port offset in the Tape - Coordinator's /usr/afs/backup/tapeconfig file, rather than - from tape. For the sake of clarity, the following text refers to tapes - only, but the Backup System handles backup data files in much the same - way.) -
The command's arguments can be combined as indicated: -
In each case, the command sets each volume's creation date to the date - and time at which it restores it. The creation date appears in the - Creation field in the output from the vos examine and - vos listvol commands. -
If restoring all of the volumes that resided on a single partition, it is - usually more efficient to use the backup diskrestore - command. If restoring multiple volumes to many different sites, it can - be more efficient to use the backup volsetrestore command. -
By default, the backup volrestore command restores the most - recent full dump and all subsequent incremental dumps for each volume, - bringing the restored volumes to the most current possible state. To - restore the volumes to their state at some time in the past, use the - -date argument. The Backup System restores the most recent - full dump and each subsequent incremental dump for which the clone - date of the volume included in the dump is before the indicated date and - time (the clone date timestamp appears in the clone date field of - the output from the backup volinfo command). For backup and - read-only volumes, the clone date represents the time at which the volume was - copied from its read/write source; for read/write volumes, it represents - the time at which the volume was locked for inclusion in the dump. The - resemblance of a restored volume to its actual state at the indicated time - depends on the amount of time that elapsed between the volume's clone - date in the last eligible dump and the specified time. -
If the -volume argument specifies the base (read/write) form of - the volume name, the Backup System searches the Backup Database for the newest - dump set that includes a dump of either the read/write or the backup version - of the volume. It restores the dumps of that version of the volume, - starting with the most recent full dump. If, in contrast, the volume - name explicitly includes the .backup or - .readonly extension, the Backup System restores dumps of the - corresponding volume version only. -
To generate a list of the tapes the Backup System needs to perform the - restore operation, without actually performing it, combine the -n - flag with the options to be used on the actual command. -
If all of the full and incremental dumps of all relevant volumes were not - written to a type of tape that a single Tape Coordinator can read, use the - -portoffset argument to list multiple port offset numbers in the - order in which the tapes are needed (first list the port offset for the full - dump, second the port offset for the level 1 incremental dump, and so - on). If restoring multiple volumes, the same ordered list of port - offsets must apply to all of them. If not, either issue this command - separately for each volume, or use the vos volsetrestore command - after defining groups of volumes that were dumped to compatible tape - types. For further discussion, see the IBM AFS Administration - Guide. -
The Tape Coordinator's default response to this command is to access - the first tape it needs by invoking the MOUNT instruction in the - local /usr/afs/backup/CFG_device_name file, or by - prompting the backup operator to insert the tape if there is no - MOUNT instruction. However, if the AUTOQUERY NO - instruction appears in the CFG_device_name file, or if the - issuer of the butc command included the -noautoquery - flag, the Tape Coordinator instead expects the tape to be in the device - already. If it is not, or is the wrong tape, the Tape Coordinator - invokes the MOUNT instruction or prompts the operator. It - also invokes the MOUNT instruction or prompts for any additional - tapes needed to complete the restore operation; the backup operator must - arrange to provide them. -
Options -
Valid values for the year range from 1970 to - 2037; higher values are not valid because the latest possible - date in the standard UNIX representation is in February 2038. The - command interpreter automatically reduces any later date to the maximum - value. -
If this argument is omitted, the Backup System restores all possible dumps - including the most recently created. -
Note: | A plus sign follows this argument in the command's syntax statement - because it accepts a multiword value which does not need to be enclosed in - double quotes or other delimiters, not because it accepts multiple - dates. Provide only one date (and optionally, time) definition. - |
Provide this argument unless the default value of 0 (zero) is appropriate - for all dumps. If 0 is just one of the values in the list, - provide it explicitly in the appropriate order. -
Output -
If the issuer includes the -n flag with the command, the - following string appears at the head of the list of the tapes necessary to - complete the restore operation. -
Tapes needed: - --
Examples -
The following command restores the volume user.pat to - partition /vicepa on machine - fs5.abc.com: -
% backup volrestore -server fs5.abc.com -partition a -volume user.pat - --
The following command restores the volumes user.smith and - user.terry to partition /vicepb on machine - fs4.abc.com, adding a .rst - extension to each volume name and preserving the existing - user.smith and user.terry volumes. - Only dumps created before 5:00 p.m. on 31 January 1998 are - restored. (The command is shown here on multiple lines only for - legibility reasons.) -
% backup volrestore -server fs4.abc.com -partition b \ - -volume user.smith user.terry \ - -extension .rst -date 1/31/1998 17:00 - --
The following command restores the volume user.pat to - partition /vicepb on machine - fs4.abc.com. The Tape Coordinator with port - offset 1 handles the tape containing the full dump; the Tape Coordinator - with port offset 0 handles all tapes containing incremental dumps. (The - command is shown here on two lines only for legibility reasons.) -
% backup volrestore -server fs5.abc.com -partition a \ - -volume user.pat -portoffset 1 0 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server or Volume Location (VL) Server is - running, and on every file server machine that houses an affected - volume. If the -localauth flag is included, the issuer must - instead be logged on to a server machine as the local superuser - root. -
Related Information -
backup -
butc -
-
- -
-
-
Purpose -
Restores all volumes in a volume set -
Synopsis -
backup volsetrestore [-name <volume set name>] [-file <file name>] - [-portoffset <TC port offset>+] - [-extension <new volume name extension>] - [-n] [-localauth] [-cell <cell name>] [-help] - - backup vols [-na <volume set name>] [-f <file name>] - [-p <TC port offset>+] [-e <new volume name extension>] - [-n] [-l] [-c <cell name>] [-h] --
Description -
The backup volsetrestore command restores the complete contents - of a group of read/write volumes to the file system, by restoring data from - the last full dump and all subsequent incremental dumps of each volume. - It is most useful for recovering from loss of data on multiple partitions, - since it can restore each of a defined set of volumes to a different - site. -
(If the FILE YES instruction appears in the - /usr/afs/backup/CFG_device_name file associated with the - specified port offset, then the backup volsetrestore command - restores data from the backup data file listed for that port offset in the - Tape Coordinator's /usr/afs/backup/tapeconfig file, instead of - from tape. For the sake of clarity, the following text refers to tapes - only, but the Backup System handles backup data files in much the same - way.) -
If restoring one or more volumes to a single site only, it is usually more - efficient to use the backup volrestore command. If restoring - all volumes that resided on a single partition, it is usually more efficient - to use the backup diskrestore command. -
Indicate the volumes to restore by providing either the -name - argument or the -file argument: -
It is not required that the volume set was previously used to back up - volumes (was used as the -volumeset option to the backup - dump command). It can be defined especially to match the volumes - that need to be restored with this command, and that is usually the better - choice. Indeed, a temporary volume set, created by including - the -temporary flag to the backup addvolset command, can - be especially useful in this context. A temporary volume set is not - added to the Backup Database and exists only during the current interactive - backup session, which is suitable if the volume set is needed only to complete - the single restore operation initialized by this command. -
The reason that a specially defined volume set is probably better is that - volume sets previously defined for use in dump operations usually match the - backup version of volumes, whereas for a restore operation it is best to - define volume entries that match the base (read/write) name. In that - case, the Backup System searches the Backup Database for the newest dump set - that includes either the read/write or the backup version of the - volume. If, in contrast, a volume entry explicitly matches the - volume's backup or read-only version, the Backup System restores dumps of - that volume version only. -
If all of the full and incremental dumps of all relevant volumes were not - written to a type of tape that a single Tape Coordinator can read, use the - -portoffset argument to list multiple port offset numbers in the - order in which the tapes are needed (first list the port offset for the full - dump, second the port offset for the level 1 incremental dump, and so - on). This implies that the full dumps of all relevant volumes must have - been written to a type of tape that the first Tape Coordinator can read, the - level 1 incremental dumps to a type of tape the second Tape Coordinator can - read, and so on. If dumps are on multiple incompatible tape types, use - the backup volrestore command to restore individual volumes, or use - this command after defining new volume sets that group together volumes that - were dumped to compatible tape types. For further discussion, see the - IBM AFS Administration Guide. -
By default, the Backup System overwrites the contents of an existing volume - with the restored data. To create a new volume to house the restored - version instead, use the -extension argument. The Backup - System derives the new volume's name by adding the specified extension to - the read/write base name, and creates a new VLDB entry. The command - does not affect the existing volume in any way. However, if a volume - with the specified extension also already exists, the command overwrites - it. -
The -n flag produces a list of the volumes to be restored if the - -n flag were not included, without actually restoring any - volumes. See the Output section of this reference page for a - detailed description of the output, and suggestions on how to combine it most - effectively with the -file and -name arguments. -
The execution time for a backup volsetrestore command depends on - the number of volumes to be restored and the amount of data in them, but it - can take hours to restore a large number of volumes. One way to reduce - the time is to run multiple instances of the command simultaneously, either - using the -name argument to specify disjoint volume sets for each - command, or the -file argument to name files that list different - volumes. This is possible if there are multiple available Tape - Coordinators that can read the required tapes. Depending on how the - volumes to be restored were dumped to tape, specifying disjoint volume sets - can also reduce the number of tape changes required. -
The Tape Coordinator's default response to this command is to access - the first tape it needs by invoking the MOUNT instruction in the - local /usr/afs/backup/CFG_device_name file, or by - prompting the backup operator to insert the tape if there is no - MOUNT instruction. However, if the AUTOQUERY NO - instruction appears in the CFG_device_name file, or if the - issuer of the butc command included the -noautoquery - flag, the Tape Coordinator instead expects the tape to be in the device - already. If it is not, or is the wrong tape, the Tape Coordinator - invokes the MOUNT instruction or prompts the operator. It - also invokes the MOUNT instruction or prompts for any additional - tapes needed to complete the restore operation; the backup operator must - arrange to provide them. -
Options -
Each volume's entry must appear on its own (unbroken) line in the - file, and have the following format: -
machine partition - volume [comments...] - --
-
where -
-
Do not use wildcards (for example, .*) in the - machine, partition, or volume fields. It is - acceptable for multiple lines in the file to name the same volume, but the - Backup System processes only the first of them. -
Provide this argument unless the default value of 0 (zero) is appropriate - for all dumps. If 0 is just one of the values in the list, - provide it explicitly in the appropriate order. -
Output -
If the -n flag is not provided, the command displays a unique - task ID number for the operation, in two places: -
The task ID number is not the same as the job ID number displayed by the - (backup) jobs command when the (backup) volsetrestore - command is issued in interactive mode. The Backup System does not - assign either type of ID number until the restoration process actually - begins. -
When the -n flag is included, no task ID or job ID numbers are - reported because none are assigned. Instead, the output begins with a - count of the number of volumes to be restored, followed by a line for each - dump of a volume. For each volume, the line representing the most - recent full dump appears first, and lines for any subsequent incremental dumps - follow, ordered by dump level. The lines for a given volume do not - necessarily appear all together, however. -
The format of each line is as follows (the output is shown here on two - lines only for legibility reasons): -
machine partition volume_dumped # as volume_restored; tape_name (tape_ID); \ - pos position_number; date - --
where -
One way to generate a file for use as input to the -file - argument is to combine the -name and -n options, - directing the output to a file. The IBM AFS Administration - Guide section on using the Backup System to restore data explains how to - edit the file as necessary before using it as input to the -file - argument. -
The output of this command includes only volumes for which the Backup - Database includes at least one dump record. The command interpreter - generates a message on the standard error stream about volumes that do not - have dump records but either are listed in the file named by the - -file argument, or appear in the VLDB as a match to a volume entry - in the volume set named by the -name argument. -
Examples -
The following command restores all volumes included in entries in the - volume set named data.restore, which was created expressly - to restore data to a pair of file server machines on which all data was - corrupted due to a software error. All volumes are restored to the - sites recorded in their entries in the VLDB. -
% backup volsetrestore -name data.restore - Starting restore - backup: task ID of restore operation: 112 - backup: Finished doing restore - --
The following command restores all volumes that have entries in the file - named /tmp/restore: -
% backup volsetrestore -file /tmp/restore - Starting restore - backup: task ID of restore operation: 113 - backup: Finished doing restore - --
The /tmp/restore file has the following contents: -
fs1.abc.com b user.pat - fs1.abc.com b user.terry - fs1.abc.com b user.smith - fs2.abc.com c user.jones - . . . - . . . - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server or Volume Location (VL) Server is - running, and on every file server machine that houses an affected - volume. If the -localauth flag is included, the issuer must - instead be logged on to a server machine as the local superuser - root. -
Related Information -
backup -
butc -
-
- -
-
-
Purpose -
Introduction to the bos command suite -
Description -
The commands in the bos command suite are the administrative - interface to the Basic OverSeer (BOS) Server, which runs on every file server - machine to monitor the other server processes on it. If a process - fails, the BOS Server can restart it automatically, taking into account - interdependencies between it and other processes. The BOS Server frees - system administrators from constantly monitoring the status of server machines - and processes. -
There are several categories of commands in the bos command - suite: -
The BOS Server and the bos commands use and maintain the - following configuration and log files: -
For more details, see the reference page for each file. -
Options -
The following arguments and flags are available on many commands in the - bos suite. The reference page for each command also lists - them, but they are described here in greater detail. - - - -
-
Do not combine the -cell and -localauth - options. A command on which the -localauth flag is included - always runs in the local cell (as defined in the server machine's local - /usr/afs/etc/ThisCell file), whereas a command on which the - -cell argument is included runs in the specified foreign - cell. - -
Use this flag only when issuing a command on a server machine; client - machines do not usually have a /usr/afs/etc/KeyFile file. - The issuer of a command that includes this flag must be logged on to the - server machine as the local superuser root. The flag is - useful for commands invoked by an unattended application program, such as a - process controlled by the UNIX cron utility or by a cron entry in - the machine's /usr/afs/local/BosConfig file. It is also - useful if an administrator is unable to authenticate to AFS but is logged in - as the local superuser root. -
Do not combine the -cell and -localauth - options. A command on which the -localauth flag is included - always runs in the local cell (as defined in the server machine's local - /usr/afs/etc/ThisCell file), whereas a command on which the - -cell argument is included runs in the specified foreign - cell. Also, do not combine the -localauth and - -noauth flags. -
For the commands that alter the administrative files shared by all server - machines in the cell (the bos addhost, bos addkey, - bos adduser, bos removehost, bos removekey, - and bos removeuser commands), the appropriate machine depends on - whether the cell uses the United States or international version of AFS: -
To issue any bos command that changes a configuration file or - alters process status, the issuer must be listed in the - /usr/afs/etc/UserList file on the server machine named by the - -server argument. Alternatively, if the - -localauth flag is included the issuer must be logged on as the - local superuser root. -
To issue a bos command that only displays information (other - than the bos listkeys command), no privilege is required. -
Related Information -
KeyFile -
UserList -
bos exec -
bos help -
bos stop -
-
- -
-
-
Purpose -
Adds a database server machine to the /usr/afs/etc/CellServDB - file -
Synopsis -
bos addhost -server <machine name> -host <host name>+ - [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos addh -s <machine name> -ho <host name>+ - [-c <cell name>] [-n] [-l] [-he] --
Description -
The bos addhost command adds an entry for each database server - machine specified with the -host argument to the - /usr/afs/etc/CellServDB file on the machine named by the - -server argument. -
Cautions -
After executing this command (and waiting for the Update Server to - propagate the changes, if it is used), restart the database server processes - on all database server machines to force election of a quorum that includes - the new set of machines listed in the /usr/afs/etc/CellServDB - file. The IBM AFS Quick Beginnings explains in more detail - how to add and remove database server machines. -
It is best to maintain a one-to-one mapping between hostnames and IP - addresses on a multihomed database server machine (this is actually the - conventional configuration for any AFS machine). The BOS Server uses - the gethostbyname( ) routine to obtain the IP address - associated with the hostname specified by the -host - argument. If there is more than one address, the BOS Server records in - the CellServDB entry the one that appears first in the list of - addresses returned by the routine. The routine possibly returns - addresses in a different order on different machines, which can create - inconsistency. -
Options -
In cells that run the United States edition of AFS and use the Update - Server to distribute the contents of the /usr/afs/etc directory, it - is conventional to specify only the system control machine as a value for the - -server argument. In cells that run the international - version of AFS, repeat the command for each file server machine. For - further discussion, see the introductory reference page for the bos - command suite. -
Examples -
The following command adds the database server machines - db2.abc.com and db3.abc.com - to the /usr/afs/etc/CellServDB file on the machine - fs1.abc.com (the system control machine). -
% bos addhost -server fs1.abc.com -host db2.abc.com db3.abc.com - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
IBM AFS Quick Beginnings -
-
- -
-
-
Purpose -
Adds a new server encryption key to the /usr/afs/etc/KeyFile - file -
Synopsis -
bos addkey -server <machine name> [-key <key>] - -kvno <key version number> [-cell <cell name>] - [-noauth] [-localauth] [-help] - - bos addk -s <machine name> [-ke <key>] -kv <key version number> - [-ce <cell name>] [-n] [-l] [-h] --
Description -
The bos addkey command constructs a server encryption key from - the text string provided, assigns it the key version number specified with the - -kvno argument, and adds it to the /usr/afs/etc/KeyFile - file on the machine specified with the -server argument. Be - sure to use the kas setpassword or kas setkey command to - add the same key to the afs entry in the Authentication - Database. -
Do not use the -key argument, which echoes the password string - visibly on the screen. If the argument is omitted, the BOS Server - prompts for the string and does not echo it visibly: -
Input key: - Retype input key: - --
The BOS Server prohibits reuse of any key version number already listed in - the /usr/afs/etc/KeyFile file. This ensures that users who - still have tickets sealed with the current key are not prevented from - communicating with a server process because the current key is overwritten - with a new key. Use the bos listkeys command to display the - key version numbers in the /usr/afs/etc/KeyFile file. -
Options -
In cells that run the United States edition of AFS and use the Update - Server to distribute the contents of the /usr/afs/etc directory, it - is conventional to specify only the system control machine as a value for the - -server argument. In cells that run the international - version of AFS, repeat the command for each file server machine. For - further discussion, see the introductory reference page for the bos - command suite. -
Output -
If the strings typed at the Input key and Retype input - key prompts do not match, the following message appears, and the command - exits without adding a new key: -
Input key mismatch - --
Examples -
The following command adds a new server encryption key with key version - number 14 to the KeyFile file kept on the machine - fs1.abc.com (the system control machine). The - issuer omits the -key argument, as recommended, and provides the - password at the prompts. -
% bos addkey -server fs1.abc.com -kvno 14 - Input key: - Retype input key: - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
-
- -
-
-
Purpose -
Adds a privileged user to the /usr/afs/etc/UserList file -
Synopsis -
bos adduser -server <machine name> -user <user names>+ - [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos addu -s <machine name> -u <user names>+ - [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos adduser command adds each user name specified with the - -user argument to the /usr/afs/etc/UserList file on the - machine named by the -server argument. It is the - issuer's responsibility to verify that an entry for the user exists in - the Authentication and Protection Databases. -
Options -
In cells that run the United States edition of AFS and use the Update - Server to distribute the contents of the /usr/afs/etc directory, it - is conventional to specify only the system control machine as a value for the - -server argument. In cells that run the international - version of AFS, repeat the command for each file server machine. For - further discussion, see the introductory reference page for the bos - command suite. -
Examples -
The following command adds the user names pat and - smith to the /usr/afs/etc/UserList file on the machine - fs1.abc.com (the system control machine). -
% bos adduser -server fs1.abc.com -user pat smith - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
-
- -
-
-
Purpose -
Displays each help entry containing a keyword string -
Synopsis -
bos apropos -topic <help string> [-help] - - bos ap -t <help string> [-h] --
Description -
The bos apropos command displays the first line of the online - help entry for any bos command that has in its name or short - description the string specified by the -topic argument. -
To display the syntax for a command, use the bos help - command. -
Options -
Output -
The first line of a command's online help entry names it and briefly - describes its function. This command displays the first line for any - bos command where the string specified with the -topic - argument is part of the command name or first line. -
Examples -
The following command lists all bos commands that include the - word restart in their names or short descriptions: -
% bos apropos restart - getrestart: get restart times - restart: restart all processes - setrestart: set restart times - --
Privilege Required -
None -
Related Information -
bos -
bos help -
-
- -
-
-
Purpose -
Defines a new process in the /usr/afs/local/BosConfig file and - starts it running -
Synopsis -
bos create -server <machine name> -instance <server process name> - -type <server type> -cmd <command lines>+ - [-notifier <Notifier program>] [-cell <cell name>] - [-noauth] [-localauth] [-help] - - bos c -s <machine name> -i <server process name> -t <server type> - -cm <command lines>+ [-not <Notifier program>] [-ce <cell name>] - [-noa] [-l] [-h] --
Description -
The bos create command creates a server process entry in the - /usr/afs/local/BosConfig file on the server machine named by the - -server argument, sets the process's status to Run - in the BosConfig file and in memory, and starts the process. -
A server process's entry in the BosConfig file defines its - name, its type, the command that initializes it, and optionally, the name of a - notifier program that runs when the process terminates. -
Options -
-
For a simple process, provide the complete pathname of the process's - binary file on the local disk (for example, /usr/afs/bin/ptserver - for the Protection Server). If including any of the initialization - command's options, surround the entire command in double quotes (" - "). The upclient process has a required argument, and - the commands for all other processes take optional arguments. - -
For the fs process, provide the complete pathname of the local - disk binary file for each of the component processes: - fileserver, volserver, and salvager, in that - order. The standard binary directory is /usr/afs/bin. - If including any of an initialization command's options, surround the - entire command in double quotes (" "). - -
For a cron process, provide two parameters: - -
Examples -
The following command defines and starts the simple process - kaserver on the machine fs3.abc.com: -
% bos create -server fs3.abc.com -instance kaserver -type simple \ - -cmd /usr/afs/bin/kaserver - --
The following command defines and starts the simple process - upclientbin on the machine - fs4.abc.com. It references - fs1.abc.com as the source for updates to binary - files, checking for changes to the /usr/afs/bin directory every 120 - seconds. -
% bos create -server fs4.abc.com -instance upclientbin -type simple \ - -cmd "/usr/afs/bin/upclient fs1.abc.com -clear -t 120 \ - /usr/afs/bin" - --
The following command creates the fs process fs on the machine - fs4.abc.com. Type the command on a single - line. -
% bos create -server fs4.abc.com -instance fs -type fs \ - -cmd /usr/afs/bin/fileserver /usr/afs/bin/volserver \ - /usr/afs/bin/salvager - --
The following command creates a cron process called - userbackup on the machine fs5.abc.com, so - that the BOS Server issues the indicated vos backupsys command each - day at 3:00 a.m. (the command creates a backup version of - every volume in the file system whose name begins with - user). Note that the issuer provides the complete pathname - to the vos command, includes the -localauth flag on it, - and types the entire bos create command on one line. -
% bos create -server fs5.abc.com -instance userbackup -type cron \ - -cmd "/usr/afs/bin/vos backupsys -prefix user -localauth" 03:00 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
If the -notifier argument is included when this command is used - to define and start a process, the BOS Server invokes the indicated - notifier program when the process exits. The intended use of - a notifier program is to inform administrators when a process exits - unexpectedly, but it can be used to perform any appropriate actions. - The following paragraphs describe the bnode and - bnode_proc structures in which the BOS Server records information - about the exiting process. The list of AFS commands related to this one - follows. -
The BOS Server constructs and sends on the standard output stream one - bnode and one bnode_proc structure for each exiting - process associated with the notifier program. It brackets each - structure with appropriate BEGIN and END statements - (BEGIN bnode and END bnode, BEGIN bnode_proc - and END bnode_proc), which immediately follow the preceding newline - character with no intervening spaces or other characters. If the - notifier program does not need information from a structure, it can scan ahead - in the input stream for the END statement. -
In general, each field in a structure is a string of ASCII text terminated - by the newline character. The format of the information within a - structure possibly varies slightly depending on the type of process associated - with the notifier program. -
The C code for the bnode and bnode_proc structures - follows. Note that the structures sent by the BOS Server do not - necessarily include all of the fields described here, because some are used - only for internal record keeping. The notifier process must robustly - handle the absence of expected fields, as well as the presence of unexpected - fields, on the standard input stream. -
For proper performance, the notifier program must continue processing the - input stream until it detects the end-of-file (EOF). The BOS Server - closes the standard input file descriptor to the notifier process when it has - completed delivery of the data, and it is the responsibility of the notifier - process to terminate properly. -
struct bnode contents -
struct bnode { - struct bnode *next; /* next pointer in top-level's list */ - char *name; /* instance name */ - long nextTimeout; /* next time this guy should be awakened */ - long period; /* period between calls */ - long rsTime; /* time we started counting restarts */ - long rsCount; /* count of restarts since rsTime */ - struct bnode_type *type; /* type object */ - struct bnode_ops *ops; /* functions implementing bnode class */ - long procStartTime; /* last time a process was started */ - long procStarts; /* number of process starts */ - long lastAnyExit; /* last time a process exited for any reason */ - long lastErrorExit; /* last time a process exited unexpectedly */ - long errorCode; /* last exit return code */ - long errorSignal; /* last proc terminating signal */ - char *lastErrorName; /* name of proc that failed last */ - short refCount; /* reference count */ - short flags; /* random flags */ - char goal; /* 1=running or 0=not running */ - char fileGoal; /* same, but to be stored in file */ - }; - --
format of struct bnode explosion -
printf("name: %s\n",tp->name); - printf("rsTime: %ld\n", tp->rsTime); - printf("rsCount: %ld\n", tp->rsCount); - printf("procStartTime: %ld\n", tp->procStartTime); - printf("procStarts: %ld\n", tp->procStarts); - printf("lastAnyExit: %ld\n", tp->lastAnyExit); - printf("lastErrorExit: %ld\n", tp->lastErrorExit); - printf("errorCode: %ld\n", tp->errorCode); - printf("errorSignal: %ld\n", tp->errorSignal); - printf("lastErrorName: %s\n", tp->lastErrorName); - printf("goal: %d\n", tp->goal); - --
struct bnode_proc contents -
struct bnode_proc { - struct bnode_proc *next; /* next guy in top-level's list */ - struct bnode *bnode; /* bnode creating this process */ - char *comLine; /* command line used to start this process */ - char *coreName; /* optional core file component name */ - long pid; /* pid if created */ - long lastExit; /* last termination code */ - long lastSignal; /* last signal that killed this guy */ - long flags; /* flags giving process state */ - }; - --
format of struct bnode_proc explosion -
printf("comLine: %s\n", tp->comLine); - printf("coreName: %s\n", tp->coreName); - printf("pid: %ld\n", tp->pid); - printf("lastExit: %ld\n", tp->lastExit); - printf("lastSignal: %ld\n", tp->lastSignal); - --
KeyFile -
UserList -
bos -
buserver -
kaserver -
ptserver -
runntp -
salvager -
upclient -
upserver -
vlserver -
-
- -
-
-
Purpose -
Deletes a server process from the /usr/afs/local/BosConfig file -
Synopsis -
bos delete -server <machine name> -instance <server process name>+ - [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos d -s <machine name> -i <server process name>+ [-c <cell name>] - [-n] [-l] [-h] --
Description -
The bos delete command removes the - /usr/afs/local/BosConfig entry for each process indicated by the - -instance argument, on the server machine named by the - -server argument. -
Before issuing this command, issue the bos stop command to stop - the process and set its status flag in the BosConfig file to - NotRun. The bos delete command fails with an - error message if a process's status flag is Run. -
Options -
Examples -
The following command removes the buserver, kaserver, - ptserver, and vlserver entries from the - BosConfig file on db3.abc.com, a database - server machine being decommissioned. -
% bos delete -server db3.abc.com -instance buserver kaserver ptserver vlserver - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
-
- -
-
-
Purpose -
Executes a command on a remote server machine -
Synopsis -
bos exec -server <machine name> -cmd <command to execute> - [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos e -s <machine name> -cm <command to execute> [-ce <cell name>] - [-n] [-l] [-h] --
Description -
The bos exec command executes the indicated command on the file - server machine named by the -server argument. Its intended - use is to reboot the machine, using the /etc/reboot command or - equivalent. -
Options -
Examples -
The following command reboots the machine - fs2.abc.com. The issuer has previously issued - the bos shutdown command to shutdown all processes cleanly. -
% bos exec -server fs2.abc.com -cmd /sbin/shutdown -r now - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
bos -
-
- -
-
-
Purpose -
Displays the time stamps on an AFS binary file -
Synopsis -
bos getdate -server <machine name> -file <files to check>+ - [-dir <destination dir>] [-cell <cell name>] - [-noauth] [-localauth] [-help] - - bos getd -s <machine name> -f <files to check>+ [-d <destination dir>] - [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos getdate command displays the time stamps on the current - version, .BAK version (if any) and .OLD - version (if any) of each binary file named by the -file - argument. (The BOS Server automatically creates .BAK - and .OLD versions when new binaries are installed with the - bos install command.) The files must reside in the - /usr/afs/bin directory on the server machine named by the - -server argument unless the -dir argument indicates an - alternate directory. -
To revert to the .BAK version of a binary, use the - bos uninstall command. To remove obsolete binary files from - the /usr/afs/bin directory, use the bos prune - command. -
Options -
All server machines of the same AFS system type show the same timestamps if - the binaries were installed properly on the binary distribution machine for - this machine's system type, and if all other machines of that type are - running the appropriate upclientbin process. -
Output -
For each file specified with the -file argument, the output - displays the time stamp on the current (unmarked), .BAK, and - .OLD version. The output explicitly reports that a - version does not exist, rather than simply omitting it. -
Examples -
The following command examines the time stamps on the files with basename - kaserver on the machine fs2.abc.com: -
% bos getdate -server fs2.abc.com -file kaserver - File /usr/afs/bin/kaserver dated Mon Jan 4 10:00:36 1999. - .BAK file dated Wed Dec 9 18:55:04 1998, no .OLD file. - --
Privilege Required -
None -
Related Information -
KeyFile -
bos -
-
- -
-
-
Purpose -
Prints a server process's log file -
Synopsis -
bos getlog -server <machine name> -file <log file to examine> - [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos getl -s <machine name> -f <log file to examine> [-c <cell name>] - [-n] [-l] [-h] --
Description -
The bos getlog command displays on the standard output stream - the specified log file from the machine named by the -server - argument. The BOS Server fetches the log file from the - /usr/afs/logs directory unless an alternate pathname is provided as - part of the -file argument. -
Cautions -
Log files can grow quite large, especially for the database server - processes. To keep them to a manageable size, periodically either use - the UNIX rm command to truncate each log file, or use the bos - restart command to restart each process. -
It can take up to five minutes after the file is removed or process - restarted for the space occupied by a log file to become available. -
Options -
-
If a pathname and filename are provided, the log file is retrieved from the - indicated directory. Partial pathnames are interpreted relative to the - /usr/afs/logs directory. -
Output -
The output is preceded by the line -
Fetching log file 'filename'... - --
The remainder of the output depends on the particular log file. -
Examples -
The following example displays the FileLog file from the machine - fs3.abc.com: -
% bos getlog -server fs3.abc.com -file FileLog - Fetching log file 'FileLog'... - Sun Nov 8 04:00:34 1998 File server starting - Sun Nov 8 04:00:39 1998 Partition /vicepa: attached 21 volumes; - 0 volumes not attached - Sun Nov 8 04:00:40 1998 File Server started Sun Nov 8 04:00:40 - 1998 - Mon Nov 9 21:45:06 1998 CB: RCallBack (zero fid probe in host.c) - failed for host 28cf37c0.22811 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
bos -
-
- -
-
-
Purpose -
Displays the automatic restart times for server processes -
Synopsis -
bos getrestart -server <machine name> [-cell <cell name>] - [-noauth] [-localauth] [-help] - - bos getr -s <machine name> [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos getrestart command displays two restart times from the - /usr/afs/local/BosConfig file on the server machine named by the - -server argument: -
Use the bos setrestart command to set the restart times. -
Options -
Output -
The output consists of two lines: -
Server machine_name restarts at time - Server machine_name restarts for new binaries at time - --
Possible values for time include: -
Examples -
The following example displays the restart times for the machine - db2.abc.com: -
% bos getrestart db2.abc.com - Server db2.abc.com restarts at sun 4:00 am - Server db2.abc.com restarts for new binaries at 2:15 am - --
In the following example, the issuer abbreviates the machine name - fs1.abc.com to fs1, relying on the - cell's name server to resolve the name. The output echoes the - abbreviated form. -
% bos getrestart fs1 - Server fs1 restarts at sat 5:00 am - Server fs1 restarts for new binaries at 11:30 pm - --
Privilege Required -
None -
Related Information -
KeyFile -
bos -
-
- -
-
-
Purpose -
Displays the syntax of specified bos commands or lists - functional descriptions of all bos commands -
Synopsis -
bos help [-topic <help string>+] [-help] - - bos h [-t <help string>+] [-h] --
Description -
The bos help command displays the complete online help entry - (short description and syntax statement) for each command operation code - specified by the -topic argument. If the -topic - argument is omitted, the output includes the first line (name and short - description) of the online help entry for every bos command. -
To list every bos command whose name or short description - includes a specified keyword, use the bos apropos command. -
Options -
Output -
The online help entry for each bos command consists of the - following two or three lines: -
Examples -
The following command displays the online help entry for the bos - status command: -
% bos help status - bos status: show server instance status - Usage: bos status -server <machine name> [-instance <server - process name>+] [-long] [-cell <cell name>] [-noauth] - [-localauth] [-help] - --
Privilege Required -
None -
Related Information -
bos -
-
- -
-
-
Purpose -
Installs a new version of a binary file -
Synopsis -
bos install -server <machine name> -file <files to install>+ - [-dir <destination dir>] [-cell <cell name>] - [-noauth] [-localauth] [-help] - - bos i -s <machine name> -f <files to install>+ - [-d <destination dir>] [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos install command copies each binary file specified with - the -file argument to the local disk of the server machine named by - the -server argument, which is normally the binary distribution - machine for its CPU/operating system type. The destination directory is - /usr/afs/bin unless the -dir argument indicates an - alternate directory. The source file's UNIX mode bits are - preserved in the transfer. -
If there is already a file of the same name in the destination directory, - the BOS Server automatically saves it by adding a .BAK - extension. If there is a current .BAK version at - least seven days old, it replaces the current .OLD - version. If there is no current .OLD version, the - current .BAK version becomes the .OLD - version automatically. The bos getdate command displays the - timestamps on the current versions of the file. -
To start using the new binary immediately, issue the bos restart - command. Otherwise, the BOS Server automatically restarts the process - at the time defined in the /usr/afs/local/BosConfig file; use - the bos getrestart command to display the time and the bos - setrestart time to set it. -
Options -
If the machine is not a binary distribution machine and is running an - upclientbin process, then the files are overwritten the next time - the upclientbin process fetches the corresponding file from the - distribution machine (by default within five minutes). -
Examples -
The following command copies the file - /afs/abc.com/rs_aix42/usr/afs/bin/vlserver to the file - /usr/afs/bin/vlserver on the machine - fs3.abc.com, which is the binary distribution machine - for server machines running AIX 4.2 in the abc.com - cell. The current version of the /usr/afs/bin/vlserver file - is moved to /usr/afs/bin/vlserver.BAK. -
% bos install -server fs3.abc.com \ - -file /afs/abc.com/rs_aix42/usr/afs/bin/vlserver - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
-
- -
-
-
Purpose -
Displays the contents of the /usr/afs/etc/CellServDB file -
Synopsis -
bos listhosts -server <machine name> [-cell <cell name>] - [-noauth] [-localauth] [-help] - - bos listh -s <machine name> [-c <cell name>] [-n] [-l] [-h] - - bos getcell -server <machine name> [-cell <cell name>] - [-noauth] [-localauth] [-help] - - bos getc -s <machine name> [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos listhosts command formats and displays the list of a - cell's database server machines from the - /usr/afs/etc/CellServDB file on the server machine named by the - -server argument. -
To alter the list of machines, use the bos addhost and bos - removehost commands. -
Options -
For consistent performance in the cell, the output must be the same on - every server machine. The bos addhost reference page - explains how to keep the machines synchronized. -
Output -
The first line of the output names the cell to which the server machine - belongs. Each of the following lines names a database server machine - for that cell. -
The Host number assigned to each database server machine is for - server-internal use only and is not the same as, nor necessarily related to, - the machine's IP address. The BOS Server assigned it as part of - performing the bos addhost command. -
Examples -
The following command displays the database server machines listed in the - /usr/afs/etc/CellServDB file on the machine - fs7.abc.com. -
% bos listhosts fs7.abc.com - Cell name is abc.com - Host 1 is db1.abc.com - Host 2 is db2.abc.com - Host 3 is db3.abc.com - --
Privilege Required -
None -
Related Information -
KeyFile -
bos -
-
- -
-
-
Purpose -
Displays the server encryption keys from the - /usr/afs/etc/KeyFile file -
Synopsis -
bos listkeys -server <machine name> [-showkey] [-cell <cell name>] - [-noauth] [-localauth] [-help] - - bos listk -se <machine name> [-sh] [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos listkeys command formats and displays the list of server - encryption keys from the /usr/afs/etc/KeyFile file on the server - machine named by the -server argument. -
To edit the list of keys, use the bos addkey and bos - removekey commands. -
Cautions -
Displaying actual keys on the standard output stream (by including the - -showkey flag) is a security exposure. Displaying a checksum - is sufficient for most purposes. -
Options -
For consistent performance in the cell, the output must be the same on - every server machine. The bos addkey reference page explains - how to keep the machines synchronized. -
Output -
The output includes one line for each server encryption key listed in the - KeyFile file, identified by its key version number. -
If the -showkey flag is included, the output displays the actual - string of eight octal numbers that constitute the key. Each octal - number is a backslash and three decimal digits. -
If the -showkey flag is not included, the output represents each - key as a checksum, which is a decimal number derived by encrypting a constant - with the key. -
Following the list of keys or checksums, the string Keys last - changed indicates when a key was last added to the KeyFile - file. The words All done indicate the end of the - output. -
For mutual authentication to work properly, the output from the command - kas examine afs must match the key or checksum with the same key - version number in the output from this command. -
Examples -
The following example shows the checksums for the keys stored in the - KeyFile file on the machine - fs3.abc.com. -
% bos listkeys fs3.abc.com - key 1 has cksum 972037177 - key 3 has cksum 2825175022 - key 4 has cksum 260617746 - key 6 has cksum 4178774593 - Keys last changed on Mon Apr 12 11:24:46 1999. - All done. - --
The following example shows the actual keys from the KeyFile - file on the machine fs6.abc.com. -
% bos listkeys fs6.abc.com -showkey - key 0 is '\040\205\211\241\345\002\023\211' - key 1 is '\343\315\307\227\255\320\135\244' - key 2 is '\310\310\255\253\326\236\261\211' - Keys last changed on Wed Mar 31 11:24:46 1999. - All done. - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
-
- -
-
-
Purpose -
Lists the privileged users from the /usr/afs/etc/UserList file -
Synopsis -
bos listusers -server <machine name> [-cell <cell name>] - [-noauth] [-localauth] [-help] - - bos listu -s <machine name> [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos listusers command lists the user names from the - /usr/afs/etc/UserList file on the file server machine named by the - -server argument. The users are authorized to issue - privileged bos and vos commands. -
To edit the list of users, use the bos adduser and bos - removeuser commands. -
Options -
For consistent performance in the cell, the output must be the same on - every server machine. The bos adduser reference page - explains how to keep the machines synchronized. -
Output -
The output lists the user name of each user entitled to issue privileged - bos and vos commands. -
Examples -
The following example lists the users from UserList file on the - machine fs4.abc.com. -
% bos listusers fs4.abc.com - SUsers are: pat smith jones terry - --
Privilege Required -
None -
Related Information -
KeyFile -
UserList -
bos -
-
- -
-
-
Purpose -
Removes obsolete versions of files from the /usr/afs/bin and - /usr/afs/logs directories -
Synopsis -
bos prune -server <machine name> [-bak] [-old] [-core] [-all] - [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos p -s <machine name> [-b] [-o] [-co] [-a] - [-ce <cell name>] [-n] [-l] [-h] --
Description -
The bos prune command removes files from the local disk of the - server machine named by the -server argument, as specified by one - or more of the following flags provided on the command line: -
(If none of these flags are included, the command appears to succeed, but - removes no files at all.) -
To display the timestamp on the current, .BAK, and - .OLD versions of one or more files, use the bos - getdate command. -
Options -
Examples -
The following example removes all files from the /usr/afs/bin - directory on the machine fs3.abc.com that have a - .BAK or .OLD extension. -
% bos prune -server fs3.abc.com -bak -old - --
The following example removes all files from the /usr/afs/bin - directory on the machine db2.abc.com that have a - .BAK or .OLD extension, and all files from - the /usr/afs/logs directory that have a core. - prefix. -
% bos prune -server db2.abc.com -all - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
-
- -
-
-
Purpose -
Removes a database server machine from the - /usr/afs/etc/CellServDB file -
Synopsis -
bos removehost -server <machine name> -host <host name>+ - [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos removeh -s <machine name> -ho <host name>+ [-c <cell name>] - [-n] [-l] [-he] --
Description -
The bos removehost command removes the entry for each database - server machine specified with the -host argument from the - /usr/afs/etc/CellServDB file on the server machine named by the - -server argument. -
Cautions -
After executing this command (and waiting for the Update Server to - propagate the changes, if it is used), restart the database server processes - on all database server machines to force election of a quorum that includes - the new set of machines listed in the /usr/afs/etc/CellServDB - file. The IBM AFS Quick Beginnings explains in more detail - how to add and remove database server machines. -
Options -
In cells that run the United States edition of AFS and use the Update - Server to distribute the contents of the /usr/afs/etc directory, it - is conventional to specify only the system control machine as a value for the - -server argument. In cells that run the international - version of AFS, repeat the command for each file server machine. For - further discussion, see the introductory reference page for the bos - command suite. -
Examples -
The following command removes the former database server machine - db2.abc.com from the CellServDB file on - the system control machine fs1.abc.com. -
% bos removehost -server fs1.abc.com -host db2.abc.com - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
IBM AFS Quick Beginnings -
-
- -
-
-
Purpose -
Removes a server encryption key from the /usr/afs/etc/KeyFile - file -
Synopsis -
bos removekey -server <machine name> -kvno <key version number>+ - [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos removek -s <machine name> -k <key version number>+ - [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos removekey command removes each specified encryption key - from the /usr/afs/etc/KeyFile file on the machine named by the - -server argument. Use the -kvno argument to - identify each key by its key version number; use the bos - listkeys command to display the key version numbers. -
Cautions -
Before removing a obsolete key, verify that the cell's maximum ticket - lifetime has passed since the current key was defined using the kas - setpassword and bos addkey commands. This ensures that - no clients still possess tickets encrypted with the obsolete key. -
Options -
In cells that run the United States edition of AFS and use the Update - Server to distribute the contents of the /usr/afs/etc directory, it - is conventional to specify only the system control machine as a value for the - -server argument. In cells that run the international - version of AFS, repeat the command for each file server machine. For - further discussion, see the introductory reference page for the bos - command suite. -
Examples -
The following command removes the keys with key version numbers 5 and 6 - from the KeyFile file on the system control machine - fs1.abc.com. -
% bos removekey -server fs1.abc.com -kvno 5 6 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
-
- -
-
-
Purpose -
Removes a privileged user from the /usr/afs/etc/UserList file -
Synopsis -
bos removeuser -server <machine name> -user <user names>+ - [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos removeu -s <machine name> -u <user names>+ [-c <cell name>] - [-n] [-l] [-h] --
Description -
The bos removeuser command removes each user name specified with - the -user argument from the /usr/afs/etc/UserList file - on the machine named by the -server argument. -
Options -
In cells that run the United States edition of AFS and use the Update - Server to distribute the contents of the /usr/afs/etc directory, it - is conventional to specify only the system control machine as a value for the - -server argument. In cells that run the international - version of AFS, repeat the command for each file server machine. For - further discussion, see the introductory reference page for the bos - command suite. -
Examples -
The following example removes the users pat and jones - from the UserList file on the system control machine - fs1.abc.com. -
% bos removeuser -server fs1.abc.com -user pat jones - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
-
- -
-
-
Purpose -
Restarts a server process -
Synopsis -
bos restart -server <machine name> [-instance <instances>+] [-bosserver] - [-all] [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos res -s <machine name> [-i <instances>+] [-b] [-a] - [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos restart command stops and immediately restarts server - processes on the server machine named by the -server - argument. Indicate which process or processes to restart by providing - one of the following arguments: -
This command does not change a process's status flag in the - BosConfig file. -
Options -
Examples -
The following command stops and restarts all processes running on the - machine fs3.abc.com, including the BOS Server. -
% bos restart -server fs3.abc.com -bosserver - --
The following command stops and restarts all processes running on the - machine fs5.abc.com, excluding the BOS Server. -
% bos restart -server fs5.abc.com -all - --
The following command stops and restarts the Protection Server and Volume - Location (VL) Server processes on the machine - db3.abc.com: -
% bos restart -server db3.abc.com -instance ptserver vlserver - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
-
- -
-
-
Purpose -
Restores internal consistency to a file system or volume -
Synopsis -
bos salvage -server <machine name> [-partition <salvage partition>] - [-volume <salvage volume number or volume name>] - [-file <salvage log output file>] [-all] [-showlog] - [-parallel <# of max parallel partition salvaging>] - [-tmpdir <directory to place tmp files>] - [-orphans <ignore | remove | attach>] - [-cell <cell name>] - [-noauth] [-localauth] [-help] - - bos sa -se <machine name> [-part <salvage partition>] - [-v <salvage volume number or volume name>] - [-f <salvage log output file>] [-a] [-sh] - [-para <# of max parallel partition salvaging>] - [-t <directory to place tmp files>] - [-o <ignore | remove | attach>] - [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos salvage command salvages (restores internal consistency - to) one or more volumes on the file server machine named by the - -server argument. When processing one or more partitions, - the command restores consistency to corrupted read/write volumes where - possible. For read-only or backup volumes, it inspects only the volume - header: -
Use the indicated arguments to salvage a specific number of volumes: -
During the salvage of an entire machine or partition, the bos - status command reports the fs process's auxiliary status - as Salvaging file system. -
The Salvager always writes a trace to the - /usr/afs/logs/SalvageLog file on the file server machine where it - runs. To record the trace in another file as well (either in AFS or on - the local disk of the machine where the bos salvage command is - issued), name the file with the -file argument. To display - the trace on the standard output stream as it is written to the - /usr/afs/logs/SalvageLog file, include the -showlog - flag. -
By default, multiple Salvager subprocesses run in parallel: one for - each partition up to four, and four subprocesses for four or more - partitions. To increase or decrease the number of subprocesses running - in parallel, provide a positive integer value for the -parallel - argument. -
If there is more than one server partition on a physical disk, the Salvager - by default salvages them serially to avoid the inefficiency of constantly - moving the disk head from one partition to another. However, this - strategy is often not ideal if the partitions are configured as logical - volumes that span multiple disks. To force the Salvager to salvage - logical volumes in parallel, provide the string all as the value - for the -parallel argument. Provide a positive integer to - specify the number of subprocesses to run in parallel (for example, - -parallel 5all for five subprocesses), or omit the integer to run - up to four subprocesses, depending on the number of logical volumes being - salvaged. -
The Salvager creates temporary files as it runs, by default writing them to - the partition it is salvaging. The number of files can be quite large, - and if the partition is too full to accommodate them, the Salvager terminates - without completing the salvage operation (it always removes the temporary - files before exiting). Other Salvager subprocesses running at the same - time continue until they finish salvaging all other partitions where there is - enough disk space for temporary files. To complete the interrupted - salvage, reissue the command against the appropriate partitions, adding the - -tmpdir argument to redirect the temporary files to a local disk - directory that has enough space. -
The -orphans argument controls how the Salvager handles orphaned - files and directories that it finds on server partitions it is - salvaging. An orphaned element is completely inaccessible - because it is not referenced by the vnode of any directory that can act as its - parent (is higher in the filespace). Orphaned objects occupy space on - the server partition, but do not count against the volume's quota. -
Cautions -
Running this command can result in data loss if the Salvager process can - repair corruption only by removing the offending data. Consult the - IBM AFS Administration Guide for more information. -
Options -
/vicepa = vicepa = a = 0 - /vicepb = vicepb = b = 1 - --
-
After /vicepz (for which the index is 25) comes -
/vicepaa = vicepaa = aa = 26 - /vicepab = vicepab = ab = 27 - --
and so on through -
/vicepiv = vicepiv = iv = 255 - --
The BOS Server never starts more Salvager subprocesses than there are - partitions, and always starts only one process to salvage a single - volume. If this argument is omitted, up to four Salvager subprocesses - run in parallel. -
_ _ORPHANFILE_ _.index for files -
_ _ORPHANDIR_ _.index for directories -
-
where index is a two-digit number that uniquely identifies each - object. The orphans are charged against the volume's quota and - appear in the output of the ls command issued against the - volume's root directory. -
Examples -
The following command salvages all volumes on the /vicepd - partition of the machine db3.abc.com: -
% bos salvage -server db3.abc.com -partition /vicepd - --
The following command salvages the volume with volume ID number 536870988 - on partition /vicepb of the machine - fs2.abc.com: -
% bos salvage -server fs2.abc.com -partition /vicepb -volume 536870988 - --
The following command salvages all volumes on the machine - fs4.abc.com. Six Salvager processes run in - parallel rather than the default four. -
% bos salvage -server fs4.abc.com -all -parallel 6 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
salvager -
vos zap -
IBM AFS Administration Guide -
-
- -
-
-
Purpose -
Sets authorization checking requirements for all server processes -
Synopsis -
bos setauth -server <machine name> - -authrequired <on or off: authentication required for admin requests> - [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos seta -s <machine name> - -a <on or off: authentication required for admin requests> - [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos setauth command enables or disables authorization - checking on the server machine named by the -server - argument. When authorization checking is enabled (the normal case), the - AFS server processes running on the machine verify that the issuer of a - command meets its privilege requirements. When authorization checking - is disabled, server processes perform any action for anyone, including the - unprivileged user anonymous; this security exposure precludes - disabling of authorization checking except during installation or - emergencies. -
To indicate to the server processes that authorization checking is - disabled, the BOS Server creates the zero-length file - /usr/afs/local/NoAuth on its local disk. All AFS server - processes constantly monitor for the NoAuth file's presence - and do not check for authorization when it is present. The BOS Server - removes the file when this command is used to reenable authorization - checking. -
Cautions -
Do not create the NoAuth file directly, except when directed by - instructions for dealing with emergencies (doing so requires being logged in - as the local superuser root). Use this command - instead. -
Options -
Examples -
The following example disables authorization checking on the machine - fs7.abc.com: -
% bos setauth -server fs7.abc.com -authrequired off - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
NoAuth -
UserList -
bos -
-
- -
-
-
Purpose -
Sets the cell's name in the /usr/afs/etc/ThisCell and - /usr/afs/etc/CellServDB files -
Synopsis -
bos setcellname -server <machine name> -name <cell name> - [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos setc -s <machine name> -n <cell name> [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos setcellname command establishes the cell's name and - makes the server machine named by the -server argument a member of - it, by recording the value of the -name argument in two files which - it creates on the local disk: -
Cautions -
Issue this command only when the installing the cell's first AFS - server machine. The IBM AFS Quick Beginnings explains how to - copy over the ThisCell and CellServDB files from this or - another appropriate machine during installation of additional server - machines. -
Be sure to choose a satisfactory cell name when issuing this command, - because changing a cell's name is very complicated; for one thing, - it requires changing every password in the Authentication Database. - Consult the IBM AFS Administration Guide for advice on choosing a - cell name. If changing the cell's name is absolutely necessary, - contact AFS Product Support for complete instructions. -
Options -
Examples -
The following command defines the cell name abc.com in - the ThisCell and CellServDB files on the machine - fs1.abc.com as it is installed as the cell's - first server machine. -
% bos setcellname -server fs1.abc.com -name abc.com - --
Privilege Required -
Authorization checking is normally turned off during installation, which is - the only recommended time to use this command; in this case no privilege - is required. If authorization checking is turned on, the issuer must be - listed in the /usr/afs/etc/UserList file on the machine named by - the -server argument, or must be logged in as the local superuser - root if the -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
IBM AFS Quick Beginnings -
IBM AFS Administration Guide -
-
- -
-
-
Purpose -
Sets the date and time at which the BOS Server restarts processes -
Synopsis -
bos setrestart -server <machine name> -time <time to restart server> - [-general] [-newbinary] [-cell <cell name>] - [-noauth] [-localauth] [-help] - - bos setr -s <machine name> -t <time to restart server> [-g] [-ne] - [-c <cell name>] [-no] [-l] [-h] --
Description -
The bos setrestart command records in the - /usr/afs/local/BosConfig file the times at which the BOS Server - running on the server machine named by the -server argument - performs two types of restarts: -
Cautions -
Restarting a process makes it unavailable for a period of time. The - fs process has potentially the longest outage, depending on how - many volumes the file server machine houses (the File Server and Volume Server - reattach each volume when they restart). The default settings are - designed to coincide with periods of low usage, so that the restarts disturb - the smallest possible number of users. -
If the setting specified with the -time argument is within one - hour of the current time, the BOS Server does not restart any processes until - the next applicable opportunity (the next day for binary restarts, or the next - week for general restarts). -
The command changes only one type of restart setting at a time; issue - the command twice to change both settings. -
Options -
There are four acceptable values for either type of restart setting: -
If desired, precede a time or day and time definition with the string - every or at. These words do not change the - meaning, but possibly make the output of the bos getrestart command - easier to understand. -
Examples -
The following command sets the general restart time on the machine - fs4.abc.com to Saturday at 3:30 am. -
% bos setrestart -server fs4.abc.com -time "sat 3:30" -general - --
The following command sets the binary restart time on the machine - fs6.abc.com to 11:45 pm. -
% bos setrestart -server fs6.abc.com -time 23:45 -newbinary - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
-
- -
-
-
Purpose -
Stops a process without changing its status flag in the - /usr/afs/local/BosConfig file -
Synopsis -
bos shutdown -server <machine name> [-instance <instances>+] [-wait] - [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos sh -s <machine name> [-i <instances>+] [-w] - [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos shutdown command stops, on the server machine named by - the -server argument, either -
This command does not change a process's status flag in the - /usr/afs/local/BosConfig file, but only in the BOS Server's - memory. To stop a process and change its BosConfig status - flag, use the bos stop command instead. -
Once stopped with this command, a process does not run again until an - administrator starts it by using the bos start, bos - startup, or bos restart command, or until the BOS Server - restarts (assuming that the process's BosConfig status flag is - Run). -
Options -
Examples -
The following command stops all processes other than the BOS Server on the - machine fs3.abc.com. -
% bos shutdown fs3.abc.com - --
The following command stops the upserver process (server portion - of the Update Server) on the machine - fs5.abc.com. -
% bos shutdown -server fs5.abc.com -instance upserver - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
-
- -
-
-
Purpose -
Starts a process after setting its status flag in the - /usr/afs/local/BosConfig file -
Synopsis -
bos start -server <machine name> -instance <server process name>+ - [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos start -s <machine name> -i <server process name>+ - [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos start command sets the status flag for each process - specified by the -instance argument to Run in the - /usr/afs/local/BosConfig file and in the BOS Server's memory - on the server machine named by the -server argument, then starts - it. If the process is already running, the command's only effect - is to guarantee that the status flag is Run; it does not - restart the process. -
To start a process without changing its status flag in the - BosConfig file, use the bos startup command - instead. -
Options -
Examples -
The following command changes the status flag for the - upclientbin and upclientetc processes to Run - in the BosConfig file on the machine - fs6.abc.com and starts them running. -
% bos start -server fs6.abc.com -instance upclientbin upclientetc - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
-
- -
-
-
Purpose -
Starts a process without changing its status flag in the - /usr/afs/local/BosConfig file -
Synopsis -
bos startup -server <machine name> [-instance <instances>+] - [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos startu -s <machine name> [-i <instances>+] - [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos startup command starts, on the server machine named by - the -server argument, either -
To start a process and set its BosConfig status flag to - Run, use the bos start command instead. -
Options -
Examples -
The following command starts all processes marked with status flag - Run in the BosConfig file on the machine - fs3.abc.com that are not currently running. -
% bos startup fs3.abc.com - --
The following command starts the buserver, kaserver, - ptserver, and vlserver processes running on the machine - db2.abc.com, even if their status flags in the - BosConfig file are NotRun. -
% bos startup -server db2.abc.com -instance buserver kaserver ptserver vlserver - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
-
- -
-
-
Purpose -
Displays the status of server processes -
Synopsis -
bos status -server <machine name> [-instance <server process name>+] - [-long] [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos stat -s <machine name> [-i <server process name>+] - [-lon] [-c <cell name>] [-n] [-loc] [-h] --
Description -
The bos status command reports the status of processes on the - server machine named by the -server argument, either -
Options -
Output -
The output for a process includes at least one line, which reports one of - the following as the process's current status: -
If one of the following special circumstances applies to the process, the - indicated message appears in its entry: -
The entry for the fs process always includes a second line to - report the process's Auxiliary status, which is one of the - following: -
The entry for a cron process includes an Auxiliary - status that reports when the command will next execute. -
If the -long flag is used, each entry includes the following - additional information: -
If the -long flag is provided and the BOS Server discovers that - the mode bits on files and subdirectories in the local /usr/afs - directory differ from the expected values, it prints the following warning - message: -
Bosserver reports inappropriate access on server directories - --
The following chart summarizes the expected mode bit settings. A
- question mark indicates that the BOS Server does not check that bit.
-
-
/usr/afs - | drwxr?xr-x - |
/usr/afs/backup - | drwx???--- - |
/usr/afs/bin - | drwxr?xr-x - |
/usr/afs/db - | drwx???--- - |
/usr/afs/etc - | drwxr?xr-x - |
/usr/afs/etc/KeyFile - | -rw????--- - |
/usr/afs/etc/UserList - | -rw?????-- - |
/usr/afs/local - | drwx???--- - |
/usr/afs/logs - | drwxr?xr-x - |
Examples -
The following example command displays the status of processes on the - machine fs3.abc.com: -
% bos status fs3.abc.com - Instance buserver, currently running normally. - Instance kaserver, currently running normally. - Instance ptserver, currently running normally. - Instance vlserver, currently running normally. - Instance fs, has core file, currently running normally. - Auxiliary status is: file server running. - Instance upserver, currently running normally. - Instance runntp, currently running normally. - --
The following example command displays a detailed status report for the - fs and ptserver processes on the machine - fs1.abc.com. -
% bos status -server fs1.abc.com -instance fs ptserver -long - Instance fs, (type is fs), currently running normally. - Auxiliary status is: file server running. - Process last started at Wed Jan 7 5:34:49 1998 (3 proc starts) - Last exit at Wed Jan 7 5:34:49 1998 - Last error exit at Wed Jan 7 5:34:49 1998, due to shutdown - request - Command 1 is '/usr/afs/bin/fileserver' - Command 2 is '/usr/afs/bin/volserver' - Command 3 is '/usr/afs/bin/salvager' - Instance ptserver, (type is simple) currently running normally. - Process last started at Tue Jan 6 8:29:19 1998 (1 proc starts) - Command 1 is '/usr/afs/bin/ptserver' - --
Privilege Required -
None -
Related Information -
KeyFile -
bos -
-
- -
-
-
Purpose -
Stops a process after changing its status flag in the - /usr/afs/local/BosConfig file -
Synopsis -
bos stop -server <machine name> -instance <server process name>+ - [-wait] [-cell <cell name>] [-noauth] [-localauth] [-help] - - bos sto -s <machine name> -i <server process name>+ - [-w] [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos stop command sets the status flag for each process - specified with the -instance argument to NotRun in the - /usr/afs/local/BosConfig file on the server machine named by the - -server argument, then stops it. -
To stop a process without changing its BosConfig status flag, - use the bos shutdown command instead. -
Options -
Examples -
The following example command stops the upserver and - runntp on the machine fs7.abc.com. -
% bos stop -server fs7.abc.com -instance upserver runntp - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
-
- -
-
-
Purpose -
Reverts to the former version of a process's binary file -
Synopsis -
bos uninstall -server <machine name> -file <files to uninstall>+ - [-dir <destination dir>] [-cell <cell name>] - [-noauth] [-localauth] [-help] - - bos u -s <machine name> -f <files to uninstall>+ [-d <destination dir>] - [-c <cell name>] [-n] [-l] [-h] --
Description -
The bos uninstall command replaces each binary file specified by - the -file argument with its .BAKversion on the - server machine named by the -server argument, which is normally the - binary distribution machine for its CPU/operating system type. It also - changes the extension on the current .OLD version (if any) - to .BAK. Each binary file must reside in the local - /usr/afs/bin directory unless the -dir argument names an - alternate directory. -
To start using the reverted binary immediately, issue the bos - restart command. Otherwise, the BOS Server automatically restarts - the process at the time defined in the /usr/afs/local/BosConfig - file; use the bos getrestart command to display the time and - the bos setrestart time to set it. -
Options -
If the machine is not a binary distribution machine and is running an - upclientbin process, then the files are overwritten the next time - the upclientbin process fetches the corresponding file from the - distribution machine (by default within five minutes). -
Examples -
The following example command overwrites the - /usr/afs/bin/kaserver file on the machine - fs4.abc.com with its .BAKversion, - and the current .BAK version by the - .OLDversion. -
% bos uninstall -server fs4.abc.com -file kaserver - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine named by the -server argument, or must be logged onto a - server machine as the local superuser root if the - -localauth flag is included. -
Related Information -
KeyFile -
UserList -
bos -
upclient -
-
- -
-
-
Purpose -
Initializes the BOS Server -
Synopsis -
bosserver [-noauth] [-log] [-enable_peer_stats] [-enable_process_stats] - [-help] --
This command does not use the syntax conventions of the AFS command - suites. Provide the command name and all option names in full. -
Description -
The bosserver command initializes the Basic OverSeer (BOS) - Server (bosserver process). In the conventional - configuration, the binary file is located in the /usr/afs/bin - directory on a file server machine. -
The BOS Server must run on every file server machine and helps to automate - file server administration by performing the following tasks: -
The BOS Server logs a default set of important events in the file - /usr/afs/logs/BosLog. To record the name of any user who - performs a privileged bos command (one that requires being listed - in the /usr/afs/etc/UserList file), add the -log - flag. To display the contents of the BosLog file, use the - bos getlog command. -
The first time that the BOS Server initializes on a server machine, it
- creates several files and subdirectories in the local /usr/afs
- directory, and sets their mode bits to protect them from unauthorized
- access. Each time it restarts, it checks that the mode bits still
- comply with the settings listed in the following chart. A question mark
- indicates that the BOS Server initially turns off the bit (sets it to the
- hyphen), but does not check it at restart.
-
-
/usr/afs - | drwxr?xr-x - |
/usr/afs/backup - | drwx???--- - |
/usr/afs/bin - | drwxr?xr-x - |
/usr/afs/db - | drwx???--- - |
/usr/afs/etc - | drwxr?xr-x - |
/usr/afs/etc/KeyFile - | -rw????--- - |
/usr/afs/etc/UserList - | -rw?????-- - |
/usr/afs/local - | drwx???--- - |
/usr/afs/logs - | drwxr?xr-x - |
If the mode bits do not comply, the BOS Server writes the following warning - to the BosLog file: -
Bosserver reports inappropriate access on server directories - --
However, the BOS Server does not reset the mode bits, so the administrator - can set them to alternate values if desired (with the understanding that the - warning message then appears at startup). -
Options -
Examples -
The following command initializes the BOS Server and logs the names of - users who issue privileged bos commands. -
% bosserver -log & - --
Privilege Required -
The issuer most be logged onto a file server machine as the local superuser - root. -
Related Information -
BosLog -
bos -
bos exec -
bos stop -
-
- -
-
-
Purpose -
Initializes the Backup Server -
Synopsis -
buserver [-database <database directory>] - [-cellservdb <cell configuration directory>] - [-resetdb] [-noauth] [-smallht] - [-servers <list of ubik database servers>+] - [-enable_peer_stats] [-enable_process_stats] - [-help] --
This command does not use the syntax conventions of the AFS command - suites. Provide the command name and all option names in full. -
Description -
The buserver command initializes the Backup Server, which runs - on database server machines and maintains the Backup Database. In the - conventional configuration, the binary file is located in the - /usr/afs/bin directory on a file server machine. -
The buserver command is not normally issued at the command shell - prompt, but rather placed into a database server machine's - /usr/afs/local/BosConfig file with the bos create - command. If it is ever issued at the command shell prompt, the issuer - must be logged onto a file server machine as the local superuser - root. -
As it initializes, the Backup Server process creates the two files that - constitute the Backup Database, bdb.DB0 and - bdb.DBSYS1, in the /usr/afs/db directory if they - do not already exist. The Backup Database houses information about - volume sets and entries, the dump hierarchy, Tape Coordinators, and previously - performed dump sets. Use the commands in the backup suite to - administer the database. -
The Backup Server records a trace of its activity in the - /usr/afs/logs/BackupLog file. Use the bos getlog - command to display the contents of the file. -
Cautions -
The buserver process reserves port 7021 for its - use. Unexpected behavior can occur if another process tries to reserve - this port while the buserver process is running. -
Options -
Examples -
The following example bos create command creates a - buserver process on the file server machine - fs3.abc.com. It appears here on two lines only - for legibility. -
% bos create -server fs3.abc.com -instance buserver \ - -type simple -cmd /usr/afs/bin/buserver - --
Privilege Required -
The issuer must be logged in as the superuser root on a file - server machine to issue the command at a command shell prompt. It is - conventional instead to create and start the process by issuing the bos - create command. -
Related Information -
backup -
-
- -
-
-
Purpose -
Initializes the Tape Coordinator process -
Synopsis -
butc [-port <port offset>] [-debuglevel < 0 | 1 | 2 >] - [-cell <cell name>] [-noautoquery] - [-localauth] [-help] - - butc [-p <port offset>] [-d < 0 | 1 | 2 >] - [-c <cell name>] [-n] [-l] [-h] --
Description -
The butc command initializes a Tape Coordinator process on a - Tape Coordinator machine, enabling an operator to direct Backup System - requests to the associated tape device or backup data file. (The Tape - Coordinator controls a backup data file if the FILE YES instruction - appears in the /usr/afs/backup/CFG_device_name file that - corresponds to the Tape Coordinator's entry in the - /usr/afs/backup/tapeconfig file. For the sake of simplicity, - the following discusses tape devices only.) -
It is conventional to start and run the Tape Coordinator in the - foreground. In this case, it runs on its own connection, which is - unavailable for any other use and must remain open the entire time the Tape - Coordinator is to accept backup requests and while it is executing - them. (When using a window manager, the connection corresponds to a - separate command shell window.) The Tape Coordinator can run in the - background if the CFG_device_name file is configured to - eliminate any need for the Tape Coordinator to prompt the operator. In - both the foreground and background, the Tape Coordinator writes operation - traces and other output to the standard output stream on the connection over - which it was started. Use the -debuglevel argument to - control the amount of information that appears. The Tape Coordinator - also writes traces and error messages to two files in the local - /usr/afs/backup directory: -
The Tape Coordinator creates the files automatically as it - initializes. If there are existing files, the Tape Coordinator renames - them with a .old extension, overwriting the existing - .old files if they exist. It derives the - device_name part of the file names by stripping off the device - name's /dev/ prefix and replacing any other slashes with - underscores. For example, the files are called TE_rmt_4m and - TL_rmt_4m for a device called /dev/rmt/4m. -
By default, at the beginning of each operation the Tape Coordinator prompts - for the operator to insert the first tape into the drive and press - <Return>. To suppress this prompt, include the - -noautoquery flag on the command line or the instruction - AUTOQUERY NO in the - /usr/afs/backup/CFG_device_name file. When the - prompt is suppressed, the first required tape must be in the drive before a - backup command is issued. For subsequent tapes, the Tape - Coordinator uses its normal tape acquisition routine: if the - /usr/afs/backup/CFG_device_name file includes a - MOUNT instruction, the Tape Coordinator invokes the indicated - command; otherwise, it prompts the operator for the next tape. -
To stop the Tape Coordinator process, enter an interrupt signal such as - <Ctrl-c> over the dedicated connection (in the command shell - window). -
To cancel a backup operation that involves a tape before it - begins (assuming the initial tape prompt has not been suppressed), enter the - letter a (for abort) and press <Return> at - the Tape Coordinator's prompt for the first tape. -
Tape Coordinator operation depends on the correct configuration of certain - files, as described in the following list: -
Cautions -
If the Tape Coordinator machine is an AIX machine, use the SMIT - utility to set the device's block size to 0 (zero), indicating variable - block size. Otherwise, tape devices attached to machines running other - operating systems sometimes cannot read tapes written on AIX machines. - For instructions, see the IBM AFS Administration Guide chapter - about configuring the Backup System. -
Options -
Do not combine this argument with the -cell flag, and use it - only when logged on to a server machine as the local superuser - root; client machines do not have - /usr/afs/etc/KeyFile file. -
Examples -
The following command starts the Tape Coordinator with port offset - 7 at debug level 1, meaning the Tape Coordinator reports - the names of volumes it is dumping or restoring. -
% butc -port 7 -debuglevel 1 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - every machine where the Backup Server or Volume Location (VL) Server is - running, and on every file server machine that houses a volume to be backed - up. If the -localauth flag is included, the issuer must - instead be logged on to the Tape Coordinator machine as the local superuser - root. In addition, the issuer must be able to read and write - to the log and configuration files in the local /usr/afs/backup - directory. -
Related Information -
KeyFile -
UserList -
-
- -
-
-
Purpose -
Authenticates to the DCE Security Service -
Synopsis -
dlog [-principal <user name>] [-cell <cell name>] - [-password <user's password>] [-servers <explicit list of servers>+] - [-lifetime <ticket lifetime in hh[:mm[:ss]]>] - [-setpag] [-pipe] [-help] - - dlog [-pr <user name>] [-c <cell name>] [-pw <user's password>] - [-ser <explicit list of servers>+] - [-l <ticket lifetime in hh[:mm[:ss]]>] [-set] [-pi] [-h] --
Description -
The dlog command obtains DCE credentials for the issuer from the - DCE Security Service in the cell named by the -cell argument, and - stores them on the AFS client machine on which the user issues the - command. The AFS/DFS Migration Toolkit Protocol Translator processes - running on machines in the DCE cell accept the credentials, which enables the - user to access the DCE cell's filespace from the AFS client. The - user's identity in the local file system is unchanged. -
If the issuer does not provide the -principal argument, the - dlog command interpreter uses the user name under which the issuer - is logged into the local file system. Provide the DCE password for the - appropriate user name. As with the klog command, the - password does not cross the network in clear text (unless the issuer is logged - into the AFS client from a remote machine). -
The credentials are valid for a lifetime equivalent to the smallest of the - following, all but the last of which is defined by the DCE cell's - Security Server: -
If the previous maximum certificate lifetime values are set to - default-policy, the maximum possible ticket lifetime is defined by - the default certificate lifetime. Refer to the DCE vendor's - administration guide for more information before setting any of these - values. -
The AFS Cache Manager stores the ticket in a credential structure - associated with the name of the issuer (or the user named by the - -principal argument. If the user already has a ticket for - the DCE cell, the ticket resulting from this command replaces it in the - credential structure. -
The AFS tokens command displays the ticket obtained by the - dlog command for the server principal afs, regardless of - the principal to which it is actually granted. Note that the - tokens command does not distinguish tickets for a DFSTM - File Server from tickets for an AFS File Server. -
Options -
If the issuer does not provide the -cell argument, the - dlog command attempts to authenticate with the DCE Security Server - for the cell defined by -
The requested lifetime must be smaller than any of the DCE cell's - determinants for ticket lifetime; see the discussion in the preceding - Description section. -
Output -
If the dlog command interpreter cannot contact a Translator - Server, it produces a message similar to the following: -
dlog: server or network not responding -- failed to contact - authentication service - --
Examples -
The following command authenticates the issuer as cell_admin in - the dce.abc.com cell. -
% dlog -principal cell_admin -cell dce.abc.com - Password: cell_admin's password - --
In the following example, the issuer authenticates as cell_admin - to the dce.abc.com cell and request a ticket lifetime - of 100 hours. The tokens command confirms that the user - obtained DCE credentials as the user cell_admin: the AFS ID - is equivalent to the UNIX ID of 1 assigned to cell_admin - in dce.abc.com cell's DCE registry. -
% dlog -principal cell_admin -cell dce.abc.com -lifetime 100 - Password: cell_admin's password - - % tokens - Tokens held by the Cache Manager: - - User's (AFS ID 1) tokens for afs@dce.abc.com [Expires Jul 6 14:12] - User's (AFS ID 4758) tokens for afs@abc.com [Expires Jul 2 13:14] - - --End of list-- - --
Privilege Required -
None -
Related Information -
dpass -
klog -
tokens -
unlog -
-
- -
-
-
Purpose -
Returns the DCE password for a new DCE account -
Synopsis -
dpass [-cell <original AFS cell name>] [-help] - - dpass [-c <original AFS cell name>] [-h] --
Description -
The dpass command returns the DCE password that an administrator - assigned to the issuer when using the dm pass command to migrate - AFS user accounts into a DCE cell. -
The dpass command, issued on an AFS client, requests the - issuer's new DCE password from the AFS cell specified with the - -cell argument. -
The issuer must be authenticated as the AFS user whose AFS account was - moved into DCE, and be able to provide the user's AFS password when - prompted by the dpass command. -
Options -
Output -
By default, the dpass command writes a message similar to the - following to the standard output stream. -
Please read the following message before entering your password. - - This program will display your new, temporary DCE password on your - terminal, and you should change the assigned password as soon as - possible (from a DCE client). The program assumes that the AFS cell - uses the AFS Authentication Server and that an administrator used the - utilities in the AFS/DFS Migration Toolkit to migrate the account from - AFS to DCE. The password you enter should be the AFS password that was - in effect when your DCE account was created; this is not necessarily - the same password you have at the moment. The cell name (which you - may override with a command line option), must be the name of the AFS - cell from which the authentication information was taken. - --
To suppress this message, set the DPASS_NO_MESSAGE environment - variable. It is then possible to substitute a customized message if - desired by using a script similar to the following example: -
#! /bin/csh - echo "Start of customized message" - echo "Continuation of customized message" - . - . - . - echo "Conclusion of customized message" - setenv DPASS_NO_MESSAGE - dpass $* - --
After the standard or customized message, if any, the dpass - command generates the following prompt for the original AFS password: -
Original password for AFS cell cell: - Re-enter password to verify: - --
If the AFS passwords match and are correct, the command reports the - temporary DCE password in the following message. -
The new DCE password is: Issuer's_temporary_DCE_password - --
Examples -
The following example returns the DCE password of the issuer, whose AFS - account is in the abc.com cell. The DPASS_NO_MESSAGE - variable has been set to suppress the standard message. -
% dpass - Original password for AFS cell abc.com: Issuer's_AFS_password - Re-enter password to verify: Issuer's_AFS_password - The new DCE password is: 8655--eg8e-dcdc-8157 - --
Privilege Required -
The issuer must be authenticated as the AFS user for whom to display the - corresponding DCE password. -
Related Information -
dlog -
dm pass reference page in IBM AFS/DFS Migration Toolkit - Administration Guide and Reference -
-
- -
-
-
Purpose -
Initializes the File Server component of the fs process -
Synopsis -
fileserver [-d <debug level>] [-p <number of processes>] - [-spare <number of spare blocks>] - [-pctspare <percentage spare>] [-b <buffers>] - [-l <large vnodes>] [-s <small nodes>] - [-vc <volume cachesize>] [-w <call back wait interval>] - [-cb <number of call backs>] - [-banner (print banner every 10 minutes)] - [-novbc (whole volume cbs disabled)] - [-implicit <admin mode bits: rlidwka>] - [-hr <number of hours between refreshing the host cps>] - [-busyat <redirect clients when queue > n>] - [-rxpck <number of rx extra packets>] - [-rxdbg (enable rx debugging)] - [-rxdbge (enable rxevent debugging)] - [-m <min percentage spare in partition>] - [-lock (keep fileserver from swapping)] - [-L (large server conf)] [-S (small server conf)] - [-k <stack size>] [-realm <Kerberos realm name>] - [-udpsize <size of socket buffer in bytes>] - [-enable_peer_stats] [-enable_process_stats] - [-help] --
This command does not use the syntax conventions of the AFS command - suites. Provide the command name and all option names in full. -
Description -
The fileserver command initializes the File Server component of - the fs process. In the conventional configuration, its - binary file is located in the /usr/afs/bin directory on a file - server machine. -
The fileserver command is not normally issued at the command - shell prompt, but rather placed into a database server machine's - /usr/afs/local/BosConfig file with the bos create - command. If it is ever issued at the command shell prompt, the issuer - must be logged onto a file server machine as the local superuser - root. -
The File Server creates the /usr/afs/logs/FileLog log file as it - initializes, if the file does not already exist. It does not write a - detailed trace by default, but use the -d option to increase the - amount of detail. Use the bos getlog command to display the - contents of the log file. -
The command's arguments enable the administrator to control many - aspects of the File Server's performance, as detailed in the - Options section. By default the fileserver - command sets values for many arguments that are suitable for a medium-sized - file server machine. To set values suitable for a small or large file - server machine, use the -S or -L flag - respectively. The following list describes the parameters and - corresponding argument for which the fileserver command sets - default values, and Table 1 summarizes the setting for each of the three machine - sizes. -
Table 1. File Server configuration parameters
-
Parameter (Argument) - | Small configuration (-S) - | Medium configuration (default) - | Large configuration (-L) - |
Number of LWPs (-p) - | 6 - | 9 - | 12 - |
Number of cached directory blocks (-b) - | 70 - | 90 - | 120 - |
Number of cached large vnodes (-l) - | 200 - | 400 - | 600 - |
Number of cached small vnodes (-s) - | 200 - | 400 - | 600 - |
Maximum volume cache size (-vc) - | 200 - | 400 - | 600 - |
Number of callbacks (-cb) - | 20,000 - | 60,000 - | 64,000 - |
Number of Rx packets (-rxpck) - | 100 - | 150 - | 200 - |
To override any of the values, provide the indicated argument (which can be - combined with the -S or -L flag). -
The amount of memory required for the File Server varies. The - approximate default memory usage is 751 KB when the -S flag is used - (small configuration), 1.1 MB when all defaults are used (medium - configuration), and 1.4 MB when the -L flag is used (large - configuration). If additional memory is available, increasing the value - of the -cb and -vc arguments can improve File Server - performance most directly. -
By default, the File Server allows a volume to exceed its quota by 1 MB - when an application is writing data to an existing file in a volume that is - full. The File Server still does not allow users to create new files in - a full volume. To change the default, use one of the following - arguments: - -
By default, the File Server implicitly grants the a - (administer) and l (lookup) permissions to - the system:administrators on the access control list (ACL) of - every directory in the volumes stored on its file server machine. In - other words, the group's members can exercise those two permissions even - when an entry for the group does not appear on an ACL. To change the - set of default permissions, use the -implicit argument. -
The File Server maintains a host current protection subgroup - (host CPS) for each client machine from which it has received a - data access request. Like the CPS for a user, a host CPS lists all of - the Protection Database groups to which the machine belongs, and the File - Server compares the host CPS to a directory's ACL to determine in what - manner users on the machine are authorized to access the directory's - contents. When the pts adduser or pts removeuser - command is used to change the groups to which a machine belongs, the File - Server must recompute the machine's host CPS in order to notice the - change. By default, the File Server contacts the Protection Server - every two hours to recompute host CPSs, implying that it can take that long - for changed group memberships to become effective. To change this - frequency, use the -hr argument. -
Note: | The AIX operating system does not automatically reserve a part of each - partition to avoid the negative consequences that can result when the space on - a partition is completely exhausted. Therefore, the AIX version of the - File Server creates an 8% disk reserve automatically. To change the - percentage, use the -m argument. - |
The File Server generates the following message when a partition is nearly - full: -
No space left on device - --
Cautions -
Do not use the -k and -w arguments, which are - intended for use by the AFS Development group only. Changing them from - their default values can result in unpredictable File Server behavior. - In any case, on many operating systems the File Server uses native threads - rather than the LWP threads, so using the -k argument to set the - number of LWP threads has no effect. -
Do not specify both the -spare and -pctspare - arguments. Doing so causes the File Server to exit, leaving an error - message in the /usr/afs/logs/FileLog file. -
Options that are available only on some system types, such as the - -m and -lock options, appear in the output generated by - the -help option only on the relevant system type. -
Options -
The maximum number of threads can differ in each release of AFS. - Consult the IBM AFS Release Notes for the current release. -
File Server is running at time. - --
Note: | The File Server always implicitly grants the a permission to the - system:administrators group, even if you use the - none value. - |
Note: | This argument is available only on machines running the AIX operating system, - and so does not appear in the syntax statement when the -help flag - is used on other system types. - |
Note: | This argument is available only on machines running the IRIX operating - system, and so does not appear in the syntax statement when the - -help flag is used on other system types. - |
Examples -
The following bos create command creates an fs - process on the file server machine fs2.abc.com that - uses the large configuration size, and allows volumes to exceed their quota by - 10%. Type the command on a single line: -
% bos create -server fs2.abc.com -instance fs -type fs \ - -cmd "/usr/afs/bin/fileserver -pctspare 10 \ - -L" /usr/afs/bin/volserver /usr/afs/bin/salvager --
Privilege Required -
The issuer must be logged in as the superuser root on a file - server machine to issue the command at a command shell prompt. It is - conventional instead to create and start the process by issuing the bos - create command. -
Related Information -
FileLog -
salvager -
-
- -
-
-
Purpose -
Determine a tape's capacity and a tape device's filemark size -
Synopsis -
fms -tape <tape special file> [-help] - - fms -t <tape special file> [-h] --
Description -
The fms command determines the capacity of the tape currently in - the tape device identified by the -tape argument, along with the - size of the filemark for the device. The filemark is also referred to - as the device's end-of-file (EOF) marker, and can differ for each - combination of tape and tape device. -
As the Tape Coordinator writes a dump, it writes a filemark between the - data included from each volume and also tracks the amount of space left before - the end of the tape (EOT). For some tape devices, the filemark is large - enough (multiple megabytes) that failure to consider it leads the Tape - Coordinator significantly to overestimate the available space. -
The intended use of this command is to determine tape capacity and filemark - size values that can be specified in a tape device's entry in the - /usr/afs/backup/tapeconfig file. For certain types of tape - drives, the Tape Coordinator operates more efficiently when the - tapeconfig file lists accurate values. For further - discussion, see the IBM AFS Administration Guide chapter on - configuring the Backup System. -
Insert a tape in the drive before issuing this command. -
Cautions -
Do not use this command on compressing tape devices in compression mode or - with tape devices that handle tapes of multigigabyte (or multiterabyte) - capacity. It does not produce accurate results in those cases. - For alternate suggestions on the values to record in the tapeconfig - file for compressing drives, see the IBM AFS Administration Guide - chapter on configuring the Backup System. -
Running the command completely overwrites the tape, so use a blank one or - one that can be recycled. -
Because it writes filemarks to the complete length of the tape, the command - can take from several hours to more than a day to complete. -
Options -
Output -
The command generates output both on the standard output stream and in the - fms.log file that it creates in the current working - directory. The output reports the capacity of the tape in the device - and the device's filemark size. -
The first few lines of output include status information about the - execution of the command, including such information as the number of blocks - and the number of file marks written to the tape by the command. The - last two lines of both screen and file output provide the following - information: -
The following message indicates that the fms command interpreter - cannot access the tape device. The command halts. -
Can't open tape drive device - --
The following message indicates that the command interpreter cannot create - the fms.log log file. Again, the command - halts. -
Can't open log file - --
Examples -
The following command illustrates the output for the device called - /dev/rmt1h: -
% fms /dev/rmt1h - wrote block: 130408 - Finished data capacity test - rewinding - wrote 1109 blocks, 1109 file marks - Finished file mark test - Tape capacity is 2136604672 bytes - File marks are 1910205 bytes - --
The following appears in the fms.log file: -
fms test started - wrote 9230 blocks - Finished file mark test - Tape capacity is 151224320 bytes - File marks are 2375680 bytes - --
Privilege Required -
The issuer must be able to insert and write to files in the currently - working directory, if the fms.log file does not already - exist. If it already exists, the issuer need only be able to write to - it. -
Related Information -
fms.log -
-
- -
-
-
Purpose -
Introduction to the fs command suite -
Description -
The commands in the fs command suite constitute the main - administrative interface to the Cache Manager on an AFS client machine, which - is responsible for fetching AFS data from file server machines on behalf of - applications running on the client machine. -
There are several categories of commands in the fs command - suite: -
fs setserverprefs, fs sysname, and fs - wscell -
fs whereis, and fs whichcell -
The Cache Manager and the fs commands use and maintain the - following configuration files: -
In addition, the Cache Manager automatically creates files on the cache - partition (by default, /usr/vice/cache for caching and tracking - files fetched from file server machines. -
For more details, see the reference page for each file. -
Options -
The following flag is available on every command in the fs - suite. The reference page for each command also lists it, but it is - described here in greater detail. - - - -
The privileges required for fs commands vary more than for other - command suites. Pay special attention to the Privilege - Required section of each command description. -
The various types of necessary privilege include: -
Related Information -
Vn -
fs flush -
fs help -
fs quota -
-
- -
-
-
Purpose -
Displays each help entry containing a keyword string -
Synopsis -
fs apropos -topic <help string> [-help] - - fs ap -t <help string> [-h] --
Description -
The fs apropos command displays the first line of the online - help entry for any fs command that has in its name or short - description the string specified by the -topic argument. -
To display the syntax for a command, use the fs help - command. -
Options -
Output -
The first line of a command's online help entry names it and briefly - describes its function. This command displays the first line for any - fs command where the string specified with the -topic - argument is part of the command name or first line. -
Examples -
The following command lists all fs commands that include the - word cache in their names or short online descriptions: -
% fs apropos cache - setcachesize: set cache size - flush: flush file from cache - getcacheparms: get cache usage info - monitor: set cache monitor host address - --
Privilege Required -
None -
Related Information -
fs -
fs help -
-
- -
-
-
Purpose -
Displays the status of server machines -
Synopsis -
fs checkservers [-cell <cell to check>] [-all] [-fast] - [-interval <seconds between probes>] [-help] - - fs checks [-c <cell to check>] [-a] [-f] - [-i <seconds between probes>] [-h] --
Description -
The fs checkservers command reports whether certain AFS server - machines are accessible from the local client machine. The machines - belong to one of two classes, and the Cache Manager maintains a list of them - in kernel memory: -
If the Cache Manager is unable to contact the vlserver process - on a database server machine or the fileserver process on a file - server machine, it marks the machine as inaccessible. (Actually, if a - file server machine is multihomed, the Cache Manager attempts to contact all - of the machine's interfaces, and only marks the machine as down if the - fileserver fails to reply via any of them.) The Cache - Manager then periodically (by default, every three minutes) sends a probe to - each marked machine, to see if it is still inaccessible. If a - previously inaccessible machine responds, the Cache Manager marks it as - accessible and no longer sends the periodic probes to it. -
The fs checkservers command updates the list of inaccessible - machines by having the Cache Manager probe a specified set of them: -
If the -fast flag is included, the Cache Manager does not probe - any machines, but instead reports the results of the most recent previous - probe. -
To set the interval between probes rather than produce a list of - inaccessible machines, use the -interval argument. The - non-default setting persists until the machine reboots; to preserve it - across reboots, put the appropriate fs checkservers command in the - machine's AFS initialization files. -
Cautions -
The command can take quite a while to complete, if a number of machines do - not respond to the Cache Manager's probe. The Cache Manager probes - machines sequentially and waits a standard timeout period before marking the - machine as unresponsive, to allow for slow network communication. To - make the command shell prompt return quickly, put the command in the - background. It is harmless to interrupt the command by typing - Ctrl-c or another interrupt signal. -
Note that the Cache Manager probes only server machines marked inaccessible - in its memory list. A server machine's absence from the output - does not necessarily mean that it is functioning, because it possibly is not - included in the memory list at all (if, for example, the Cache Manager has not - contacted it recently). For the same reason, the output is likely to - vary on different client machines. -
Unlike most fs commands, the fs checkservers command - does not refer to the AFSCELL environment variable. -
Options -
Output -
If there are no machines marked as inaccessible, or if all of them now - respond to the Cache Manager's probe, the output is: -
All servers are running. - --
Note that this message does not mean that all server machines in each - relevant cell are running. The output indicates the status of only - those machines that the Cache Manager probes. -
If a machine fails to respond to the probe within the timeout period, the - output begins with the string -
These servers unavailable due to network or server problems: - --
and lists the hostname of each machine on its own line. The Cache - Manager stores machine records by Internet address, so the format of each - hostname (uppercase or lowercase letters, or an Internet address in dotted - decimal format) depends on how the local cell's name service translates - it at the time the command is issued. If a server machine is - multihomed, the output lists only one of its interfaces (usually, the - currently most preferred one). -
If the -interval argument is provided with a value between - 1 and 600, there is no output. If the value is - 0, the output reports the probe interval as follows: -
The current down server probe interval is interval secs - --
Examples -
The following command displays the Cache Manager's current list of - unresponsive machines in the local cell, rather than probing them - again. The output indicates that if there were any machines marked - inaccessible, they all responded to the previous probe. -
% fs checkservers -fast - All servers are running. - --
The following example probes machines in the Cache Manager's memory - list that belong to the stateu.edu cell: -
% fs checkservers -cell stateu.edu - All servers are running. - --
The following example probes all server machines in the Cache - Manager's memory list. It reports that two machines did not - respond to the probe. -
% fs checkservers -all - These servers unavailable due to network or server problems: - fs1.abc.com SV3.STATE.EDU. - --
Privilege Required -
To set the probe interval, the issuer must be logged in as the local - superuser root. Otherwise, no privilege is required. -
Related Information -
-
- -
-
-
Purpose -
Forces the Cache Manager to update volume-related information -
Synopsis -
fs checkvolumes [-help] - - fs checkv [-h] --
Description -
The fs checkvolumes command discards the table of mappings - between volume names and volume ID numbers that the Cache Manager stores in - memory and uses when fetching data from volumes. The next time an - application requests AFS data, the Cache Manager must contact the Volume - Location (VL) Server for volume location information, and then an appropriate - file server machine for the actual data. -
The Cache Manager updates the table of mappings periodically (by default, - hourly), but this command is useful if the issuer knows that a volume's - name has changed, or that new read-only replicas of a volume have been - released, because issuing it forces the Cache Manager to reference the changed - volume. -
Options -
Output -
The following message confirms that the command ran successfully. -
All volumeID/name mappings checked. - --
Privilege Required -
None -
-
- -
-
-
Purpose -
Remove obsolete entries from an ACL -
Synopsis -
fs cleanacl [-path <dir/file path>+] [-help] - - fs cl [-p <dir/file path>+] [-h] --
Description -
The fs cleanacl command removes from the access control list - (ACL) of each specified directory or file any entry that refers to a user or - group that no longer has a Protection Database entry. Such an entry - appears on the ACL as an AFS user ID number (UID) rather than a name, because - without a Protection Database entry, the File Server cannot translate the UID - into a name. -
Cleaning access control lists in this way not only keeps them from becoming - crowded with irrelevant information, but also prevents the new possessor of a - recycled AFS UID from obtaining access intended for the former possessor of - the AFS UID. (Note that recycling UIDs is not recommended in any - case.) -
Options -
Specify the read/write path to each directory, to avoid the failure that - results from attempting to change a read-only volume. By convention, - the read/write path is indicated by placing a period before the cell name at - the pathname's second level (for example, - /afs/.abc.com). For further discussion of the - concept of read/write and read-only paths through the filespace, see the - fs mkmount reference page. -
Output -
If there are no obsolete entries on the ACL, the following message - appears: -
Access list for dir/file path is fine. - --
Otherwise, the output reports the resulting state of the ACL, following the - header -
Access list for dir/file path is now - --
At the same time, the following error message appears for each file in the - cleaned directories: -
fs: 'filename': Not a directory - --
Examples -
The following example illustrates the cleaning of the ACLs on the current - working directory and two of its subdirectories. Only the second - subdirectory had obsolete entries on it. -
% fs cleanacl -path . ./reports ./sources - Access list for . is fine. - Access list for ./reports is fine. - Access list for ./sources is now - Normal rights: - system:authuser rl - pat rlidwka - --
Privilege Required -
The issuer must have the a (administer) permission on - each directory's ACL (or the ACL of each file's parent - directory); the directory's owner and the members of the - system:administrators group have the right implicitly, even - if it does not appear on the ACL. -
Related Information -
-
- -
-
-
Purpose -
Copies an ACL from one directory to one or more other directories -
Synopsis -
fs copyacl -fromdir <source directory (or DFS file)> - -todir <destination directory (or DFS file)>+ - [-clear] [-id] [-if] [-help] - - fs co -f <source directory (or DFS file)> - -t <destination directory (or DFS file)>+ - [-c] [-id] [-if] [-h] --
Description -
The fs copyacl command copies the access control list (ACL) from - a source directory to each specified destination directory. The source - directory's ACL is unchanged, and changes to the destination - directory's ACL obey the following rules: -
When using this command to copy ACLs between objects in DFS filespace - accessed via the AFS/DFS Migration Toolkit Protocol Translator, it is possible - to specify files, as well as directories, with the -fromdir and - -todir arguments. For more information on copying ACLs - between DFS directories and files, refer to the IBM AFS/DFS Migration - Toolkit Administration Guide and Reference. -
Cautions -
Do not copy ACLs between AFS and DFS files or directories. The ACL - formats are incompatible. -
Options -
Specify the read/write path to each directory (or DFS file), to avoid the - failure that results from attempting to change a read-only volume. By - convention, the read/write path is indicated by placing a period before the - cell name at the pathname's second level (for example, - /afs/.abc.com). For further discussion of the - concept of read/write and read-only paths through the filespace, see the - fs mkmount reference page. -
Examples -
The following example command copies the current working directory's - ACL to its subdirectory called reports. Note that the source - directory's ACL is unaffected. Entries on the reports - directory's that are not on the source ACL of the current directory - remain unaffected as well, because the -clear flag is not - used. -
% fs listacl . reports - Access list for . is - Normal rights: - pat rlidwka - smith rlidwk - Access list for reports is - Normal rights: - pat rl - pat:friends rl - Negative rights - jones rlidwka - - % fs copyacl -fromdir . -todir reports - - % fs listacl . reports - Access list for . is - Normal rights: - pat rlidwka - smith rlidwk - Access list for reports is - Normal rights: - pat rlidwka - pat:friends rl - smith rlidwk - Negative rights - jones rlidwka - --
Privilege Required -
To copy an ACL between AFS objects, the issuer must have the l - (lookup)) permission on the source directory's ACL and the - a (administer) permission on each destination - directory's ACL. If the -fromdir argument names a file - rather than a directory, the issuer must have both the l and - r (read) permissions on the ACL of the file's - directory. -
To copy an ACL between DFS objects, the issuer must have the r - permission on the source directory or file's ACL and the c - (control) permission on each destination directory or file's - ACL. -
Related Information -
IBM AFS/DFS Migration Toolkit Administration Guide and Reference -
-
- -
-
-
Purpose -
Displays information about the partition housing a directory or file -
Synopsis -
fs diskfree [-path <dir/file path>+] [-help] - - fs df [-p <dir/file path>+] [-h] - - fs di [-p <dir/file path>+] [-h] --
Description -
The fs diskfree command formats and displays information about - the partition that houses the volume containing the specified directory or - file, including its size and how much space is currently used. -
To display information about the volume itself, use the fs - examine command. The fs examine and fs - quota commands also display information about a volume. -
Cautions -
The partition-related statistics in this command's output do not - always agree with the corresponding values in the output of the standard UNIX - df command. The statistics reported by this command can be - up to five minutes old, because the Cache Manager polls the File Server for - partition information at that frequency. Also, on some operating - systems, the df command's report of partition size includes - reserved space not included in this command's calculation, and so is - likely to be about 10% larger. -
Options -
Output -
The output reports the following information about the volume and partition - that houses each file or directory: -
If the %used statistic is greater than 90%, it is marked with - the string <<WARNING at the right margin. -
If the volume is a read-only volume, the output includes information about - only one of the partitions that houses it, generally the one on the file - server machine with the lowest preference rank. To verify which machine - the output is referring to, use the vos listvldb command to list - the volume's locations, and the vos partinfo command to - display the size of each one. -
Examples -
The following example shows the output for the partitions housing the - volumes user.smith and sun4x_56.bin: -
% fs diskfree -path /afs/abc.com/usr/smith /afs/abc.com/sun4x_56/bin - Volume Name kbytes used avail %used - user.smith 4177920 3841258 336662 92% <<WARNING - sun4x_56.bin 4423680 3174500 1249180 72% - --
Privilege Required -
The issuer must have the l (lookup) permission on the - ACL of the root directory of the volume that houses the file or directory - named by the -path argument, and on the ACL of each directory that - precedes it in the pathname. -
Related Information -
-
- -
-
-
Purpose -
Displays information about the volume containing a directory or file -
Synopsis -
fs examine [-path <dir/file path>+] [-help] - - fs exa [-p <dir/file path>+] [-h] - - fs listvol [-p <dir/file path>+] [-h] - - fs listv [-p <dir/file path>+] [-h] - - fs lv [-p <dir/file path>+] [-h] --
Description -
The fs examine command displays information about the volume - containing each specified directory or file, including its volume ID number, - quota and the percentage of its quota that is used. -
This command provides the most information about a volume, but the fs - listquota command displays similar information in tabular format, and - the fs quota command reports only the percentage of quota - used. -
To set volume quota, use the fs setquota or fs setvol - command. -
Cautions -
The partition-related statistics in this command's output do not - always agree with the corresponding values in the output of the standard UNIX - df command. The statistics reported by this command can be - up to five minutes old, because the Cache Manager polls the File Server for - partition information at that frequency. Also, on some operating - systems, the df command's report of partition size includes - reserved space not included in this command's calculation, and so is - likely to be about 10% larger. -
Options -
Output -
The output displays information about the volume that houses each specified - directory or file, in the following format -
Volume status for vid = volume ID named volume name - Current offline message is message - Current disk quota is quota in kilobytes - Current blocks used are volume size in kilobytes - The partition has available partition blocks available out of - partition size - --
where the first line specifies the volume's ID number and name. - The Current offline message line appears only - if an administrator has included the -offlinemsg argument to the - fs setvol command. The remaining lines report, respectively, -
Examples -
The following example shows the output for the volume - user.smith and the partition housing it: -
% fs examine -path /afs/abc.com/usr/smith - Volume status for vid = 50489902 named user.smith - Current maximum quota is 15000 - Current blocks used are 5073 - The partition has 336662 blocks available out of 4177920 - --
Privilege Required -
The issuer must have the l (lookup) permission on the - ACL of the root directory of the volume that houses the file or directory - named by the -path argument, and on the ACL of each directory that - precedes it in the pathname. -
Related Information -
fs quota -
-
- -
-
-
Purpose -
Reports or sets whether the machine can export AFS to clients of other file - systems -
Synopsis -
fs exportafs -type <exporter name> - [-start <start/stop translator (on | off)>] - [-convert <convert from afs to unix mode (on | off)>] - [-uidcheck <run on strict 'uid check' mode (on | off)>] - [-submounts <allow nfs mounts to subdirs of /afs/.. (on | off)>] - [-help] - - fs exp -t <exporter name> - [-st <start/stop translator (on | off)>] - [-c <convert from afs to unix mode (on | off)>] - [-u <run on strict 'uid check' mode (on | off)>] - [-su <allow nfs mounts to subdirs of /afs/.. (on | off)>] - [-help] --
Description -
The fs exportafs command sets (if the -start argument - is provided) or reports (if it is omitted) whether the machine can reexport - the AFS filespace to clients of a non-AFS file system. To control - certain features of the translation protocol, use the following - arguments: -
Options -
With respect to the knfs command, this value means that the - value of -id argument must match the issuer's local UID on the - translator machine. In practice, this setting makes it pointless to - include the -id argument to the knfs command, because - the only acceptable value (the issuer's local UID) is already used when - the -id argument is omitted. -
Enabling UID checking also makes it impossible to issue the klog - and pagsh commands on a client machine of the non-AFS file system - even though it is a system type supported by AFS. For an explanation, - see the reference page for the klog command. -
With respect to the knfs command, it means that the issuer can - use the -id argument to assign tokens to a local UID on the NFS - client machine that does not match his or her local UID on the translator - machine. (An example is assigning tokens to the MFS client - machine's local superuser root.) This setting allows - more than one issuer of the knfs command to make tokens available - to the same user on the NFS client machine. Each time a different user - issues the knfs command with the same value for the -id - argument, that user's tokens overwrite the existing ones. This can - result in unpredictable access for the user on the NFS client machine. -
Output -
If the machine is not even configured as a server of the non-AFS file - system, the following message appears: -
Sorry, the file_system-exporter type is currently not supported on - this AFS client - --
If the machine is configured as a server of the non-AFS file system but is - not currently enabled to reexport AFS to it (because the -start - argument to this command is not set to on), the message is as - follows: -
'file_system' translator is disabled - --
If the machine is enabled to reexport AFS, the following message precedes - messages that report the settings of the other parameters. -
'file_system' translator is enabled with the following options: - --
The following messages indicate that the -convert argument is - set to on or off respectively: -
Running in convert owner mode bits to world/other mode - Running in strict unix mode - --
The following messages indicate that the -uidcheck argument is - set to on or off respectively: -
Running in strict 'passwd sync' mode - Running in no 'passwd sync' mode - --
The following messages indicate that the -submounts argument is - set to on or off respectively: -
Allow mounts of /afs/.. subdirs - Only mounts to /afs allowed - --
Examples -
The following example shows that the local machine can export AFS to NFS - client machines. -
% fs exportafs nfs - 'nfs' translator is enabled with the following options: - Running in convert owner mode bits to world/other mode - Running in no 'passwd sync' mode - Only mounts to /afs allowed - --
The following example enables the machine as an NFS server and converts the - UNIX group and other mode bits on exported AFS - directories and files to match the UNIX owner mode bits. -
% fs exportafs -type nfs -start on -convert on - --
The following example disables the machine from reexporting AFS to NFS - client machines: -
% fs exportafs -type nfs -start off - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
klog -
knfs -
-
- -
-
-
Purpose -
Forces the Cache Manager to discard a cached file or directory -
Synopsis -
fs flush [-path <dir/file path>+] [-help] - - fs flush [-p <dir/file path>+] [-h] --
Description -
The fs flush command removes from the cache all data and status - information associated with each specified file or directory. The next - time an application requests data from the flushed directory or file, the - Cache Manager fetches the most current version from a File Server, along with - a new callback (if necessary) and associated status information. This - command has no effect on two types of data: -
To flush all data in the cache that was fetched from the same volume as a - specified file or directory, use the fs flushvolume command. - To flush a corrupted mount point, use the fs flushmount - command. -
Options -
Examples -
The following command flushes from the cache the file - projectnotes in the current working directory and all data from the - subdirectory plans: -
% fs flush -path projectnotes ./plans/* - --
Privilege Required -
The issuer must have the l (lookup) permission on the - ACL of the root directory of the volume that houses the file or directory - named by the -path argument, and on the ACL of each directory that - precedes it in the pathname. -
Related Information -
-
- -
-
-
Purpose -
Forces the Cache Manager to discard a mount point -
Synopsis -
fs flushmount [-path <dir/file path>+] [-help] - - fs flushm [-p <dir/file path>+] [-h] --
Description -
The fs flushmount command removes from the cache all information - associated with each mount point named by the -path - argument. The next time an application accesses the mount point, the - Cache Manager fetches the most current version of it from the File - Server. Data cached from the associated volume is not affected. -
The command's intended use is to discard information about mount - points that has become corrupted in the cache. (The Cache Manager - periodically refreshes cached mount points, but the only other way to discard - them immediately is to reinitialize the Cache Manager by rebooting the - machine.) Symptoms of a corrupted mount point included garbled output - from the fs lsmount command, and failed attempts to change - directory to or list the contents of a mount point. -
To flush cached data rather than a mount point, use the fs flush - or fs flushvolume command. -
Options -
Examples -
The following command flushes from the cache the mount point for user - pat's home directory: -
% fs flushm /afs/abc.com/usr/pat - --
Privilege Required -
The issuer must have the l (lookup) permission on the - ACL of the root directory of the volume that houses the file or directory - named by the -path argument, and on the ACL of each directory that - precedes it in the pathname. -
Related Information -
fs flush -
-
- -
-
-
Purpose -
Forces the Cache Manager to discard all cached data from the volume - containing a file or directory -
Synopsis -
fs flushvolume [-path <dir/file path>+] [-help] - - fs flushv [-p <dir/file path>+] [-h] --
Description -
The fs flushvolume command removes from the cache all data that - was fetched from the same volume as each specified directory or file. - It does not discard cached status information. The next time an - application requests data from a flushed directory or file, the Cache Manager - fetches the most current version from a File Server, along with a new callback - (if necessary) and associated status information. This command has no - effect on two types of data: -
To discard the data and status information associated with individual files - and directories, use the fs flush command. To flush a - corrupted mount point, use the fs flushmount command. -
Options -
Examples -
The following command flushes from the cache all data fetched from the - volume that contains the current working directory: -
% fs flushvolume - --
Privilege Required -
The issuer must have the l (lookup) permission on the - ACL of the root directory of the volume that houses the file or directory - named by the -path argument, and on the ACL of each directory that - precedes it in the pathname. -
Related Information -
fs flush -
-
- -
-
-
Purpose -
Displays the current size of the cache and the amount being used -
Synopsis -
fs getcacheparms [-help] - - fs getca [-h] --
Description -
The fs getcacheparms command displays the current size of the - cache (which can be in memory or on disk), and the amount currently in - use. -
The reported statistics are from kernel memory, so the reported size can - differ from the setting specified in the /usr/vice/etc/cacheinfo - file on a machine using a disk cache, if the fs setcachesize - command has been used to alter cache size. -
Options -
Output -
The output reports -
AFS using amount used of the cache's available size 1K byte blocks. - --
where amount used is the number of kilobyte blocks currently used - to cache data and status information, and size is the total current - cache size. -
Examples -
The following example shows the output on a machine with a 25000 kilobyte - cache. -
% fs getcacheparms - AFS using 22876 of the cache's available 25000 1K byte blocks. - --
Privilege Required -
None -
Related Information -
-
- -
-
-
Purpose -
Reports whether the machine can run setuid programs from a specified cell -
Synopsis -
fs getcellstatus -cell <cell name>+ [-help] - - fs getce -c <cell name>+ [-h] --
Description -
The fs getcellstatus command reports whether the Cache Manager - allows programs fetched from each specified cell to run with setuid - permission. To set a cell's setuid status, use the fs - setcell command; its reference page fully describes how AFS treats - setuid programs. -
Options -
Output -
The output reports one of the following two values as appropriate: -
Cell cell status: setuid allowed - Cell cell status: no setuid allowed - --
Examples -
The following example indicates that programs from the cell - abc.com are not allowed to run with setuid - permission. -
% fs getcellstatus abc.com - Cell abc.com status: no setuid allowed - --
Privilege Required -
None -
Related Information -
-
- -
-
-
Purpose -
Displays the client interfaces to register with the File Server -
Synopsis -
fs getclientaddrs [-help] - - fs gc [-h] - - fs getcl [-h] --
Description -
The fs getclientaddrs command displays the IP addresses of the - interfaces that the local Cache Manager registers with a File Server when - first establishing a connection to it. -
The File Server uses the addresses when it initiates a remote procedure - call (RPC) to the Cache Manager (as opposed to responding to an RPC sent by - the Cache Manager). There are two common circumstances in which the - File Server initiates RPCs: when it breaks callbacks and when it pings - the client machine to verify that the Cache Manager is still - accessible. -
If an RPC to that interface fails, the File Server simultaneously sends - RPCs to all of the other interfaces in the list, to learn which of them are - still available. Whichever interface replies first is the one to which - the File Server then sends pings and RPCs to break callbacks. -
The fs setclientaddrs reference page explains how the Cache - Manager constructs the list automatically in kernel memory as it initializes, - and how to use that command to alter the kernel list after - initialization. -
Cautions -
The File Server uses the list of interfaces displayed by this command only - when selecting an alternative interface after a failed attempt to break a - callback or ping the Cache Manager. When responding to the Cache - Manager's request for file system data, the File Server replies to the - interface which the Cache Manager used when sending the request. If the - File Server's reply to a data request fails, the file server - machine's network routing configuration determines which alternate - network routes to the client machine are available for resending the - reply. -
The displayed list applies to all File Servers to which the Cache Manager - connects in the future. It is not practical to register different sets - of addresses with different File Servers, because it requires using the - fs setclientaddrs command to change the list and then rebooting - each relevant File Server immediately. -
The displayed list is not necessarily governing the behavior of a given - File Server, if an administrator has issued the fs setclientaddrs - command since the Cache Manager first contacted that File Server. It - determines only which addresses the Cache Manager registers when connecting to - File Servers in the future. -
The list of interfaces does not influence the Cache Manager's choice - of interface when establishing a connection to a File Server. -
Options -
Output -
The output displays the IP address of each interface that the Cache Manager - is currently registering with File Server processes that it contacts, with one - address per line. The File Server initially uses the first address for - breaking callbacks and pinging the Cache Manager, but the ordering of the - other interfaces is not meaningful. -
Examples -
The following example displays the two interfaces that the Cache Manager is - registering with File Servers. -
% fs getclientaddrs - 192.12.105.68 - 192.12.108.84 - --
Privilege Required -
None -
Related Information -
-
- -
-
-
Purpose -
Displays the Cache Manager's preference ranks for file server or VL - Server machines -
Synopsis -
fs getserverprefs [-file <output to named file>] - [-numeric] [-vlservers] [-help] - - fs gets [-f <output to named file>] [-n] [-v] [-h] - - fs gp [-f <output to named file>] [-n] [-v] [-h] --
Description -
The fs getserverprefs command displays preference ranks for file - server machine interfaces (file server machines run the fs process) - or, if the -vlserver flag is provided, for Volume Location (VL) - Server machines (which run the vlserver process). For file - server machines, the Cache Manager tracks up to 15 interfaces per machine and - assigns a separate rank to each interface. The ranks indicate the order - in which the local Cache Manager attempts to contact the interfaces of - machines that are housing a volume when it needs to fetch data from the - volume. For VL Server machines, the ranks indicate the order in which - the Cache Manager attempts to contact a cell's VL Servers when requesting - VLDB information. For both types of rank, lower integer values are more - preferred. -
The Cache Manager stores ranks in kernel memory. Once set, a rank - persists until the machine reboots, or until the fs setserverprefs - command is used to change it. The reference page for the fs - setserverprefs command explains how the Cache Manager sets default - ranks, and how to use that command to change the default values. -
Default VL Server ranks range from 10,000 to 10,126, and the Cache Manager - assigns them to every machine listed in its copy of the - /usr/vice/etc/CellServDB file. When the Cache Manager needs - to fetch VLDB information from a cell, it compares the ranks for the VL Server - machines belonging to that cell, and attempts to contact the VL Server with - the lowest integer rank. If the Cache Manager cannot reach the VL - Server (because of server process, machine or network outage), it tries to - contact the VL Server with the next lowest integer rank, and so on. If - all of a cell's VL Server machines are unavailable, the Cache Manager - cannot fetch data from the cell. -
Default file server ranks range from 5,000 to 40,000, excluding the range - used for VL Servers (10,000 to 10,126); the maximum possible rank is - 65,534. When the Cache Manager needs to fetch data from a volume, it - compares the ranks for the interfaces of machines that house the volume, and - attempts to contact the interface that has the lowest integer rank. If - it cannot reach the fileserver process via that interface (because - of server process, machine or network outage), it tries to contact the - interface with the next lowest integer rank, and so on. If it cannot - reach any of the interfaces for machines that house the volume, it cannot - fetch data from the volume. -
For both file server machines and VL Server machines, it is possible for a - machine or interface in a foreign cell to have the same rank as a machine or - interface in the local cell. This does not present a problem, because - the Cache Manager only ever compares ranks for machines belonging to one cell - at a time. -
Options -
Output -
The output consists of a separate line for each file server machine - interface or VL Server machine, pairing the machine's hostname or IP - address with its rank. The Cache Manager stores IP addresses in its - kernel list of ranks, but the command by default identifies interfaces by - hostname, by calling a translation routine that refers to either the - cell's name service (such as the Domain Name Server) or the local host - table. If an IP address appears in the output, it is because the - translation attempt failed. To bypass the translation step and display - IP addresses rather than hostnames, include the -numeric - flag. This can significantly speed the production of output. -
By default, the command writes to the standard output stream. Use - the -file argument to write the output to a file instead. -
Examples -
The following example displays the local Cache Manager's preference - ranks for file server machines. The local machine belongs to the AFS - cell named abc.com, and in this example the ranks of file - server machines in its local cell are lower than the ranks of file server - machines from the foreign cell, def.com. It is not - possible to translate the IP addresses of two machines on the 138.255 - network. -
% fs getserverprefs - fs2.abc.com 20007 - fs3.abc.com 30002 - fs1.abc.com 20011 - fs4.abc.com 30010 - server1.def.com 40002 - 138.255.33.34 40000 - server6.def.com 40012 - 138.255.33.37 40005 - --
The following example shows hows the output displays IP addresses when the - -numeric flag is included, and illustrates how network proximity - determines default ranks (as described on the fs setserverprefs - reference page). The local machine has IP address - 192.12.107.210, and the two file server machines on its - subnetwork have ranks of 20,007 and 20,011. The two file server - machines on a different subnetwork of the local machine's network have - higher ranks, 30,002 and 30,010, whereas the ranks of the remaining machines - range from 40,000 to 40,012 because they are in a completely different - network. -
% fs getserverprefs -numeric - 192.12.107.214 20007 - 192.12.105.99 30002 - 192.12.107.212 20011 - 192.12.105.100 30010 - 138.255.33.41 40002 - 138.255.33.34 40000 - 138.255.33.36 40012 - 138.255.33.37 40005 - --
The example shows how the -vlservers flag displays preference - ranks for VL Server machines: -
% fs getserverprefs -vlservers - fs2.abc.com 10052 - fs3.abc.com 10113 - fs1.abc.com 10005 - --
Privilege Required -
None -
Related Information -
-
- -
-
-
Purpose -
Displays the syntax of specified fs commands or lists functional - descriptions of all fs commands -
Synopsis -
fs help [-topic <help string>+] [-help] - - fs h [-t <help string>+] [-h] --
Description -
The fs help command displays the complete online help entry - (short description and syntax statement) for each command operation code - specified by the -topic argument. If the -topic - argument is omitted, the output includes the first line (name and short - description) of the online help entry for every fs command. -
To display every fs command whose name or short description - includes a specified keyword, use the fs apropos command. -
Options -
Output -
The online help entry for each fs command consists of the - following two or three lines: -
Examples -
The following command displays the online help entry for the fs - setacl command: -
% fs help setacl - fs setacl: set access control list - aliases: sa - Usage: fs setacl -dir <directory>+ - -acl <access list entries>+ [-clear] [-negative] [-help] - --
Privilege Required -
None -
Related Information -
fs -
-
- -
-
-
Purpose -
Displays ACLs -
Synopsis -
fs listacl [-path <dir/file path>+] [-id] [-if] [-help] - - fs la [-p <dir/file path>+] [-id] [-if] [-h] - - fs lista [-p <dir/file path>+] [-id] [-if] [-h] --
Description -
The fs listacl command displays the access control list (ACL) - associated with each specified file, directory, or symbolic link. The - specified element can reside in the DFS filespace if the issuer is using the - AFS/DFS Migration Toolkit Protocol Translator to access DFS data (and DFS does - implement per-file ACLs). To display the ACL of the current working - directory, omit the -path argument. -
To alter an ACL, use the fs setacl command. To copy an - ACL from one directory to another, use the fs copyacl - command. To remove obsolete entries from an ACL, use the fs - cleanacl command. -
Cautions -
Placing a user or group on the Negative rights section of the - ACL does not guarantee denial of permissions, if the Normal rights - section grants the permissions to members of the - system:anyuser group. In that case, the user needs - only to issue the unlog command to obtain the permissions granted - to the system:anyuser group. -
Options -
Output -
The first line of the output for each file, directory, or symbolic link - reads as follows: -
Access list for directory is - --
If the issuer used shorthand notation in the pathname, such as the period - (.) to represent the current current directory, that - notation sometimes appears instead of the full pathname of the - directory. -
Next, the Normal rights header precedes a list of users and - groups who are granted the indicated permissions, with one pairing of user or - group and permissions on each line. If negative permissions have been - assigned to any user or group, those entries follow a Negative - rights header. The format of negative entries is the same as - those on the Normal rights section of the ACL, but the user or - group is denied rather than granted the indicated permissions. -
AFS does not implement per-file ACLs, so for a file the command displays - the ACL on its directory. The output for a symbolic link displays the - ACL that applies to its target file or directory, rather than the ACL on the - directory that houses the symbolic link. -
The permissions for AFS enable the possessor to perform the indicated - action: -
For DFS files and directories, the permissions are similar, except that the - DFS x (execute) permission replaces the AFS l - (lookup) permission, DFS c (control) replaces - AFS a (administer), and there is no DFS equivalent to - the AFS k (lock) permission. The meanings of the - various permissions also differ slightly, and DFS does not implement negative - permissions. For a complete description of DFS permissions, see the DFS - documentation and the IBM AFS/DFS Migration Toolkit Administration Guide - and Reference. -
Examples -
The following command displays the ACL on the home directory of the user - pat (the current working directory), and on its private - subdirectory. -
% fs listacl -path . private - Access list for . is - Normal rights: - system:authuser rl - pat rlidwka - pat:friends rlid - Negative rights: - smith rlidwka - Access list for private is - Normal rights: - pat rlidwka - --
Privilege Required -
If the -path argument names an AFS directory, the issuer must - have the l (lookup) permission on its ACL and the ACL - for every directory that precedes it in the pathname. -
If the -path argument names an AFS file, the issuer must have - the l (lookup) and r (read) - permissions on the ACL of the file's directory, and the l - permission on the ACL of each directory that precedes it in the - pathname. -
If the -path argument names a DFS directory or file, the issuer - must have the x (execute) permission on its ACL and on - the ACL of each directory that precedes it in the pathname. -
Related Information -
IBM AFS/DFS Migration Toolkit Administration Guide and Reference -
-
- -
-
-
Purpose -
Displays the database server machines in each cell known to the Cache - Manager -
Synopsis -
fs listcells [-numeric] [-help] - - fs listc [-n] [-h] --
Description -
The fs listcells command formats and displays the list of the - database server machines that the Cache Manager stores in kernel memory for - its home cell and foreign cells. -
At each reboot of the client machine, the Cache Manager copies the contents - of /usr/vice/etc/CellServDB into kernel memory. To modify - the list between reboots, use the fs newcell command. -
Options -
Output -
The output includes a line for each cell included in the Cache - Manager's kernel memory list, in the following format: -
Cell cell on hosts database server machines - --
The Cache Manager stores IP addresses, but by default has them translated - to hostnames before reporting them, by passing them to the cell's name - service (such as the Domain Name Service or a local host table). The - name service sometimes returns hostnames in uppercase letters, or an IP - address if it cannot resolve a name. -
Using the -numeric flag bypasses the translation to hostnames, - which can result in significantly faster production of output. The - output includes IP addresses only. -
Examples -
The following example shows output for several cells as illustrations of - the different formats for machine names: -
% fs listcells - Cell abc.com on hosts fs1.abc.com fs2.abc.com fs3.abc.com - Cell stateu.edu on hosts DB1.FS.STATEU.EDU - DB2.FS.STATEU.EDU DB3.FS.STATEU.EDU - Cell def.gov on hosts 138.255.0.2 sv3.def.gov - --
Privilege Required -
None -
Related Information -
-
- -
-
-
Purpose -
Displays quota information for the volume containing a file or - directory. -
Synopsis -
fs listquota [-path <dir/file path>+] [-help] - - fs listq [-p <dir/file path>+] [-h] - - fs lq [-p <dir/file path>+] [-h] --
Description -
The fs listquota command displays information about the volume - containing each specified directory or file (its name, quota, and amount of - disk space used), along with an indicator of the percentage of space used on - the host partition. -
To display more information about the host partition, use the fs - examine command. -
To set volume quota, use the fs setquota or fs setvol - command. -
Options -
Output -
The output displays information about the volume that houses each specified - directory or file, in a tabular format that uses the following headers: -
Examples -
The following example shows the output for the volume - user.smith: -
% fs listquota -path /afs/abc.com/usr/smith - Volume Name Quota Used % Used Partition - user.smith 15000 5071 34% 86% - --
Privilege Required -
The issuer must have the l (lookup) permission on the - ACL of the root directory of the volume that houses the file or directory - named by the -path argument, and on the ACL of each directory that - precedes it in the pathname. -
Related Information -
fs quota -
-
- -
-
-
Purpose -
Reports the volume for which a directory is the mount point. -
Synopsis -
fs lsmount -dir <directory>+ [-help] - - fs ls -d <directory>+ [-h] --
Description -
The fs lsmount command reports the volume for which each - specified directory is a mount point, or indicates with an error message that - a directory is not a mount point or is not in AFS. -
To create a mount point, use the fs mkmount command. To - remove one, use the fs rmmount command. -
Options -
Output -
If the specified directory is a mount point, the output is of the following - form: -
'directory' is a mount point for volume 'volume name' - --
where -
The fs mkmount reference page explains how the Cache Manager - interprets each of the three types of mount points. -
If the directory is a symbolic link to a mount point, the output is of the - form: -
'directory' is a symbolic link, leading to a mount point for volume 'volume name' - --
If the directory is not a mount point or is not in AFS, the output - reads: -
'directory' is not a mount point. - --
If the output is garbled, it is possible that the mount point has become - corrupted in the local AFS client cache. Use the fs - flushmount command to discard it, which forces the Cache Manager to - refetch the mount point. -
Examples -
The following example shows the mount point for the home directory of user - smith: -
% fs lsmount /afs/abc.com/usr/smith - '/afs/abc.com/usr/smith' is a mount point for volume '#user.smith' - --
The following example shows both the regular and read/write mount points - for the ABC Corporation cell's root.cell volume. -
% fs lsmount /afs/abc.com - '/afs/abc.com' is a mount point for volume '#root.cell' - - % fs lsmount /afs/.abc.com - '/afs/.abc.com' is a mount point for volume '%root.cell' - --
The following example shows a cellular mount point: the State - University cell's root.cell volume as mounted in the - ABC Corporation cell's tree. -
% fs lsmount /afs/stateu.edu - '/afs/stateu.edu' is a mount point for volume '#stateu.edu:root.cell' - --
Privilege Required -
The issuer must have the l (lookup) permission on the - ACL of the root directory of the volume that houses the file or directory - named by the -dir argument, and on the ACL of each directory that - precedes it in the pathname. -
Related Information -
-
- -
-
-
Purpose -
Sets whether the Cache Manager writes log messages -
Synopsis -
fs messages [-show <[user|console|all|none]>] [-help] - - fs me [-s <[user|console|all|none]>] [-h] --
Description -
The fs messages command controls whether the Cache Manager - displays status and warning messages on user screens, the client machine - console, on both, or on neither. -
There are two types of Cache Manager messages: -
Disabling messaging completely is not recommended, because the messages - provide useful status and warning information. -
Options -
Examples -
The following command instructs the Cache Manager to display both types of - messages: -
% fs messages -show all - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
afsd -
-
- -
-
-
Purpose -
Creates a mount point for a volume -
Synopsis -
fs mkmount -dir <directory> -vol <volume name> [-cell <cell name>] - [-rw] [-fast] [-help] - - fs mk -d <directory> -v <volume name> [-c <cell name>] [-r] [-f] [-h] --
Description -
The fs mkmount command creates a mount point for the volume - named by the -vol argument at the location in the AFS file space - specified by the -dir argument. The mount point looks like a - standard directory element, and serves as the volume's root directory, - but is actually a special file system object that refers to an AFS - volume. When the Cache Manager first encounters a given mount point - during pathname traversal, it contacts the VL Server to learn which file - server machines house the indicated volume, then fetches a copy of the - volume's root directory from the appropriate file server machine. -
It is possible, although not recommended, to create more than one mount - point to a volume. The Cache Manager can become confused if a volume is - mounted in two places along the same path through the filespace. -
The Cache Manager observes three basic rules as it traverses the AFS - filespace and encounters mount points: -
When the Cache Manager encounters a mount point that specifies a volume - with either a .readonly or a .backup - extension, it accesses that type of volume only. If a mount point does - not have either a .backup or .readonly - extension, the Cache Manager uses Rules 2 and 3. -
For example, the Cache Manager never accesses the read/write version of a - volume if the mount point names the backup version. If the specified - version is inaccessible, the Cache Manager reports an error. -
If a mount point resides in a read-only volume and the volume that it - references is replicated, the Cache Manager attempts to access a read-only - copy of the volume; if the referenced volume is not replicated, the Cache - Manager accesses the read/write copy. The Cache Manager is thus said to - prefer a read-only path through the filespace, accessing read-only - volumes when they are available. -
The Cache Manager starts on the read-only path in the first place because - it always accesses a read-only copy of the root.afs volume - if it exists; the volume is mounted at the root of a cell's AFS - filespace (named /afs by convention). That is, if the - root.afs volume is replicated, the Cache Manager attempts to - access a read-only copy of it rather than the read/write copy. This - rule then keeps the Cache Manager on a read-only path as long as each - successive volume is replicated. The implication is that both the - root.afs and root.cell volumes must be - replicated for the Cache Manager to access replicated volumes mounted below - them in the AFS filespace. The volumes are conventionally mounted at - the /afs and /afs/cellname directories, - respectively. -
If a mount point resides in a read/write volume and the volume name does - not have a .readonly or a .backup - extension, the Cache Manager attempts to access only the a read/write version - of the volume. The access attempt fails with an error if the read/write - version is inaccessible, even if a read-only version is accessible. In - this situation the Cache Manager is said to be on a read/write path - and cannot switch back to the read-only path unless mount point explicitly - names a volume with a .readonly extension. (Cellular - mount points are an important exception to this rule, as explained in the - following discussion. -
There are three types of mount points, each appropriate for a different - purpose because of the manner in which the Cache Manager interprets - them. -
Note: | A regular mount point does not force the Cache Manager always to access - read-only volumes (it is explicitly not a "read-only mount point"). If - a volume is not replicated, the third traversal rule means that the Cache - Manager still accesses the read/write volume when that is the only type - available. However, if the Cache Manager is to access the read-only - version of a replicated volume named by a regular mount point, all volumes - that are mounted above it in the pathname must also be replicated. - |
To create a read/write mount point, include the -rw flag on the - fs mkmount command. It is conventional to create only one - read/write mount point in a cell's filespace, using it to mount the - cell's root.cell volume just below the AFS filespace - root (by convention, /afs/.cellname). See - the IBM AFS Quick Beginnings for instructions and the chapter about - volume management in the IBM AFS Administration Guide for further - discussion. -
Creating a read/write mount point for a read-only or backup volume is - acceptable, but unnecessary. The first rule of mount point traversal - already specifies that the Cache Manager accesses them if the volume name in a - regular mount point has a .readonly or - .backup extension. -
To create a regular cellular mount point, include the -cell - argument on the fs mkmount command. It is conventional to - create cellular mount points only at the second level in a cell's - filespace, using them to mount foreign cells' root.cell - volumes just below the AFS filespace root (by convention, at - /afs/foreign_cellname). The mount point enables - local users to access the foreign cell's filespace, assuming they have - the necessary permissions on the ACL of the volume's root directory and - that there is an entry for the foreign cell in each local client - machine's /usr/vice/etc/CellServDB file. In the output - of the fs lsmount command, the cell name and a colon - (:) appear between the initial number sign and the volume - name in a regular cellular mount point name. -
Options -
Specify the read/write path to the directory, to avoid the failure that - results from attempting to create a new mount point in a read-only - volume. By convention, the read/write path is indicated by placing a - period before the cell name at the pathname's second level (for example, - /afs/.abc.com). For further discussion of the - concept of read/write and read-only paths through the filespace, see the - Description section of this reference page. -
If this argument is omitted, no cell indicator appears in the mount - point. When the Cache Manager interprets it, it assumes that the volume - named in the mount point resides in the same cell as the volume that houses - the mount point. -
Examples -
The following command creates a regular mount point, mounting the volume - user.smith at - /afs/abc.com/usr/smith: -
% cd /afs/abc.com/usr - - % fs mkmount -dir smith -vol user.smith - --
The following commands create a read/write mount point and a regular mount - point for the ABC Corporation cell's root.cell volume - in that cell's file tree. The second command follows the - convention of putting a period at the beginning of the read/write mount - point's name. -
% fs mkmount -dir /afs/abc.com -vol root.cell - - % fs mkmount -dir /afs/.abc.com -vol root.cell -rw - --
The following command mounts the State University cell's - root.cell volume in the ABC Corporation cell's file - tree, creating a regular cellular mount point called - /afs/stateu.edu. When a ABC Corporation Cache Manager - encounters this mount point, it crosses into the State University cell on a - read-only path. -
% fs mkmount -dir /afs/stateu.edu -vol root.cell -c stateu.edu - --
Privilege Required -
The issuer must have the i (insert) and a - (administer) permissions on the ACL of the directory that is to - house the mount point. -
Related Information -
-
- -
-
-
Purpose -
Changes the kernel-resident list of a cell's database server machines -
Synopsis -
fs newcell -name <cell name> -servers <primary servers>+ - [-linkedcell <linked cell name>] [-help] - - fs n -n <cell name> -s <primary servers>+ [-l <linked cell name>] [-h] --
Description -
The fs newcell command removes the Cache Manager's - kernel-resident list of database server machines for the cell specified by the - -name argument and replaces it with the database server machines - named by the -servers argument. -
Each time the machine reboots, the Cache Manager constructs the kernel list - of cells and database server machines by reading the local - /usr/vice/etc/CellServDB file. This command does not change - the CellServDB file, so any changes made with it persist only until - the next reboot, unless the issuer also edits the file. The output of - the fs listcells command reflects changes made with this command, - because that command consults the kernel-resident list rather than the - CellServDB file. -
This command can introduce a completely new cell into the kernel-resident - list, but cannot make a cell inaccessible (it is not possible to remove a - cell's entry from the kernel-resident list by providing no values for the - -server argument). To make a cell inaccessible, remove its - entry from the CellServDB file and reboot the machine. -
If the -name argument names a DCE cell, then the - -servers argument names DFS Fileset Location (FL) Server - machines. The -linkedcell argument specifies the name of the - AFS cell to link to a DCE cell for the purpose of DFS fileset location. - Refer to the IBM AFS/DFS Migration Toolkit Administration Guide and - Reference for more information on linking AFS clients to DCE cells using - this command or by editing the /usr/vice/etc/CellServDB - file. -
Cautions -
Some commands, such as the klog command, work correctly only - when the information is accurate for a cell in both the CellServDB - file and the kernel-resident list. -
Options -
Examples -
The following example changes the machine's kernel-resident list of - database server machines for the ABC Corporation cell to include the machines - db1.abc.com and - db2.abc.com: -
% fs newcell -name abc.com -servers db1.abc.com db2.abc.com - --
The following example links the DCE cell - dce.abc.com to the AFS cell - abc.com. The AFS client contacts the Fileset Location - (FL) servers db1.dce.abc.com and - db2.dce.abc.com for fileset location - information as it interprets a DFS pathname. -
% fs newcell -name dce.abc.com -servers db1.dce.abc.com db2.dce.abc.com \ - -linkedcell abc.com - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
IBM AFS/DFS Migration Toolkit Administration Guide and Reference -
IBM AFS/DFS Migration Toolkit Administration Installation and - Configuration Guide -
-
- -
-
-
Purpose -
Displays the percentage of quota used in the volume containing a directory - or file -
Synopsis -
fs quota [-path <dir/file path>+] [-help] - - fs q [-p <dir/file path>+] [-h] --
Description -
The fs quota command displays the percent of quota consumed in - the volume that contains each specified directory or file. -
To display more detailed information about the volume and the partition it - resides on, use the fs examine and fs listquota - commands. -
To set volume quota, use the fs setquota or fs setvol - command. -
Options -
Output -
The output reports the percent of volume quota used, in the following - format: -
percent% of quota used. - --
Examples -
The following command lists the percent quota used of the volume housing - the current working directory: -
% fs quota - 17% of quota used. - --
The following command lists the percent quota used of both the volume - housing the current working directory's parent directory and the volume - housing the directory /afs/abc.com/usr/smith: -
% fs quota -path .. /afs/abc.com/usr/smith - 43% of quota used. - 92% of quota used. - --
Privilege Required -
The issuer must have the l (lookup) permission on the - ACL of the root directory of the volume that houses the file or directory - named by the -path argument, and on the ACL of each directory that - precedes it in the pathname. -
Related Information -
-
- -
-
-
Purpose -
Removes a mount point -
Synopsis -
fs rmmount -dir <directory>+ [-help] - - fs rm -d <directory>+ [-h] --
Description -
The fs rmmount command removes the mount point named by the - -dir argument from the file system. The corresponding volume - remains on its host partition or partitions, but is inaccessible if there are - no other mount points for it. -
Options -
Specify the read/write path to the directory, to avoid the failure that - results from attempting to delete a mount point from a read-only - volume. By convention, the read/write path is indicated by placing a - period before the cell name at the pathname's second level (for example, - /afs/.abc.com). For further discussion of the - concept of read/write and read-only paths through the filespace, see the - fs mkmount reference page. -
Examples -
The following command removes the mount points jones and - terry from the current working directory (the - /afs/abc.com/usr directory). -
% fs rmmount jones terry - --
Privilege Required -
The issuer must have the d (delete) permission on the - ACL of the directory that houses each mount point. -
Related Information -
-
- -
-
-
Purpose -
Sets the ACL for a directory -
Synopsis -
fs setacl -dir <directory>+ -acl <access list entries>+ - [-clear] [-negative] [-id] [-if] [-help] - - fs sa -d <directory>+ -a <access list entries>+ - [-c] [-n] [-id] [-if] [-h] - - fs seta -d <directory>+ -a <access list entries>+ - [-c] [-n] [-id] [-if] [-h] --
Description -
The fs setacl command adds the access control list (ACL) entries - specified with the -acl argument to the ACL of each directory named - by the -dir argument. -
If the -dir argument designates a pathname in DFS filespace - (accessed via the AFS/DFS Migration Toolkit Protocol Translator), it can be a - file as well as a directory. The ACL must already include an entry for - mask_obj, however. For more details, refer to the IBM - AFS/DFS Migration Toolkit Administration Guide and Reference. -
Only user and group entries are acceptable values for the -acl - argument. Do not place machine entries (IP addresses) directly on an - ACL; instead, make the machine entry a group member and place the group - on the ACL. -
To completely erase the existing ACL before adding the new entries, provide - the -clear flag. To add the specified entries to the - Negative rights section of the ACL (deny rights to - specified users or groups), provide the -negative flag. -
To display an ACL, use the fs listacl command. To copy an - ACL from one directory to another, use the fs copyacl - command. -
Cautions -
If the ACL already grants certain permissions to a user or group, the - permissions specified with the fs setacl command replace the - existing permissions, rather than being added to them. -
Setting negative permissions is generally unnecessary and not - recommended. Simply omitting a user or group from the Normal - rights section of the ACL is normally adequate to prevent - access. In particular, note that it is futile to deny permissions that - are granted to members of the system:anyuser group on the - same ACL; the user needs only to issue the unlog command to - receive the denied permissions. -
When including the -clear option, be sure to reinstate an entry - for each directory's owner that includes at least the l - (lookup) permission. Without that permission, it is - impossible to resolve the "dot" ( . ) and "dot dot" ( . . - ) shorthand from within the directory. (The directory's owner does - implicitly have the a [administer] permission even on a - cleared ACL, but must know to use it to add other permissions.) -
Options -
Specify the read/write path to each directory (or DFS file), to avoid the - failure that results from attempting to change a read-only volume. By - convention, the read/write path is indicated by placing a period before the - cell name at the pathname's second level (for example, - /afs/.abc.com). For further discussion of the - concept of read/write and read-only paths through the filespace, see the - fs mkmount reference page. -
-
in that order, separated by a space (thus every instance of this argument - has two parts). The accepted AFS abbreviations and shorthand words, and - the meaning of each, are as follows: -
-
It is acceptable to mix entries that combine the individual letters with - entries that use the shorthand words, but not use both types of notation - within an individual pairing of user or group and permissions. -
To learn the proper format and acceptable values for DFS ACL entries, see - the IBM AFS/DFS Migration Toolkit Administration Guide and - Reference. -
This argument is not supported for DFS files or directories, because DFS - does not implement negative ACL permissions. -
Examples -
The following example adds two entries to the Normal rights - section of the current working directory's ACL: the first entry - grants r (read) and l (lookup) - permissions to the group pat:friends, while the other (using - the write shorthand) gives all permissions except a - (administer) to the user smith. -
% fs setacl -dir . -acl pat:friends rl smith write - - % fs listacl -path . - Access list for . is - Normal rights: - pat:friends rl - smith rlidwk - --
The following example includes the -clear flag, which removes - the existing permissions (as displayed with the fs listacl command) - from the current working directory's reports subdirectory and - replaces them with a new set. -
% fs listacl -dir reports - Access list for reports is - Normal rights: - system:authuser rl - pat:friends rlid - smith rlidwk - pat rlidwka - Negative rights: - terry rl - - % fs setacl -clear -dir reports -acl pat all smith write system:anyuser rl - - % fs listacl -dir reports - Access list for reports is - Normal rights: - system:anyuser rl - smith rlidwk - pat rlidwka - --
The following example use the -dir and -acl switches - because it sets the ACL for more than one directory (both the current working - directory and its public subdirectory). -
% fs setacl -dir . public -acl pat:friends rli - - % fs listacl -path . public - Access list for . is - Normal rights: - pat rlidwka - pat:friends rli - Access list for public is - Normal rights: - pat rlidwka - pat:friends rli - --
Privilege Required -
The issuer must have the a (administer) permission on - the directory's ACL; the directory's owner and the members of - the system:administrators group have the right implicitly, - even if it does not appear on the ACL. -
Related Information -
IBM AFS/DFS Migration Toolkit Administration Guide and Reference -
-
- -
-
-
Purpose -
Sets the size of the disk cache -
Synopsis -
fs setcachesize [-blocks <size in 1K byte blocks (0 => reset)>] - [-reset] [-help] - - fs setca [-b <size in 1K byte blocks (0 => reset)>] [-r] [-h] - - fs cachesize [-b <size in 1K byte blocks (0 => reset)>] [-r] [-h] - - fs ca [-b <size in 1K byte blocks (0 => reset)>] [-r] [-h] --
Description -
The fs setcachesize command changes the number of kilobyte - blocks of local disk space available to the Cache Manager for its data cache, - on machines that use a disk cache. The command is not operative on - machines that use a memory cache. -
To return the cache size to the default value specified in the third field - of the local /usr/vice/etc/cacheinfo file, provide a value of - 0 to the -blocks argument. -
To return the cache size to the value set when the machine was last - rebooted, use the -reset flag instead of the -blocks - argument. This is normally the amount specified in the - cacheinfo file, unless the -blocks argument was included - on the afsd command to override the cacheinfo - value. -
To display the current cache size and amount of cache in use, for both disk - and memory caches, use the fs getcacheparms command. -
Cautions -
This command is not operative on machines using a memory cache, and results - in an error message. To change memory cache size, edit the - cacheinfo file and reboot, or reboot and provide the - -blocks argument to the afsd command. -
On machines using a disk cache, do not set the cache size to exceed 85% to - 90% of the actual disk space available for the cache directory. The - cache implementation itself requires a small amount of space on the - partition. -
Options -
Examples -
The following command sets the disk cache size to 25000 kilobyte - blocks. -
% fs setcachesize -blocks 25000 - --
Both of the following commands reset the disk cache size to the value in - the cacheinfo file, assuming that the -blocks argument - to the afsd command was not used. -
% fs setcachesize -blocks 0 - - % fs setcachesize -reset - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
afsd -
-
- -
-
-
Purpose -
Allows or disallows running of setuid programs from specified cells -
Synopsis -
fs setcell -cell <cell name>+ [-suid] [-nosuid] [-help] - - fs setce -c <cell name>+ [-s] [-n] [-h] --
Description -
The fs setcell command sets whether the Cache Manager allows - programs (and other executable files) from each cell named by the - -cell argument to run with setuid permission. By default, - the Cache Manager allows programs from its home cell to run with setuid - permission, but not programs from any foreign cells. A program belongs - to the same cell as the file server machine that houses the volume in which - the program's binary file resides, as specified in the file server - machine's /usr/afs/etc/ThisCell file. The Cache Manager - determines its own home cell by reading the /usr/vice/etc/ThisCell - file at initialization. -
To enable programs from each specified cell to run with setuid permission, - include the -suid flag. To prohibit programs from running - with setuid permission, include the -nosuid flag, or omit both - flags. -
The fs setcell command directly alters a cell's setuid - status as recorded in kernel memory, so rebooting the machine is - unnecessary. However, non-default settings do not persist across - reboots of the machine unless the appropriate fs setcell command - appears in the machine's AFS initialization file. -
To display a cell's setuid status, issue the fs - getcellstatus command. -
Cautions -
AFS does not recognize effective UID: if a setuid program accesses - AFS files and directories, it does so using the current AFS identity of the - AFS user who initialized the program, not of the program's owner. - Only the local file system recognizes effective UID. -
Only members of the system:administrators group can turn - on the setuid mode bit on an AFS file or directory. -
When the setuid mode bit is turned on, the UNIX ls -l command - displays the third user mode bit as an s instead of an - x. However, the s does not appear on an AFS file - or directory unless setuid permission is enabled for the cell in which the - file resides. -
Options -
Examples -
The following command enables executable files from the State University - cell to run with setuid privilege on the local machine: -
% fs setcell -cell stateu.edu -suid - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
-
- -
-
-
Purpose -
Sets the client interfaces to register with the File Server -
Synopsis -
fs setclientaddrs [-address <client network interfaces>+] [-help] - - fs setcl [-a <client network interfaces>+] [-h] - - fs sc [-a <client network interfaces>+] [-h] --
Description -
The fs setclientaddrs command defines the IP addresses of the - interfaces that the local Cache Manager registers with a File Server when - first establishing a connection to it. -
The File Server uses the addresses when it initiates a remote procedure - call (RPC) to the Cache Manager (as opposed to responding to an RPC sent by - the Cache Manager). There are two common circumstances in which the - File Server initiates RPCs: when it breaks callbacks and when it pings - the client machine to verify that the Cache Manager is still - accessible. -
The list of interfaces specified with this command replaces the list that - the Cache Manager constructs and records in kernel memory as it - initializes. At that time, if the file /usr/vice/etc/NetInfo - exists on the client machine's local disk, the Cache Manager uses its - contents as the basis for the list of interfaces addresses. If the file - does not exist, the Cache Manager instead uses the network interfaces - configured with the operating system. It then removes from the list any - address included in the local /usr/vice/etc/NetRestrict - file. It records the final list in kernel memory. (An - administrator must create the NetInfo and NetRestrict - files; there are no default versions of them.) -
If an RPC to that interface fails, the File Server simultaneously sends - RPCs to all of the other interfaces in the list, to learn which of them are - still available. Whichever interface replies first is the one to which - the File Server then sends pings and RPCs to break callbacks. -
To list the interfaces that the Cache Manager is currently registering with - File Servers, use the fs getclientaddrs command. -
Cautions -
The list specified with this command persists in kernel memory only until - the client machine reboots. To preserve it across reboots, either list - the interfaces in the local /usr/vice/etc/NetInfo file, or place - the appropriate fs setclientaddrs command in the machine's AFS - initialization script. -
Changes made with this command do not propagate automatically to File - Servers to which the Cache Manager has already established a - connection. To force such File Servers to use the revised list, either - reboot each file server machine, or change the NetInfo file and - reboot the client machine. -
The fs command interpreter verifies that each of the addresses - specified as a value for the -address argument is actually - configured with the operating system on the client machine. If it is - not, the command fails with an error message that marks the address as a - Nonexistent interface. -
Options -
Output -
The message -
Adding interface - --
confirms that each new interface was added to the Cache Manager's - list. The address appears in hexadecimal format to match the notation - used in the File Server log, /usr/afs/logs/FileLog. -
Examples -
The following example sets the two interfaces that the Cache Manager - registers with File Servers. -
% fs setclientaddrs 191.255.105.68 191.255.108.84 - Adding 0xbfff6944 - Adding 0xbfff6c54 - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
NetRestrict (client version) -
-
- -
-
-
Purpose -
Sets the maximum quota for the volume containing a file or directory -
Synopsis -
fs setquota [-path <dir/file path>] -max <max quota in kbytes> [-help] - - fs setq [-p <dir/file path>] -m <max quota in kbytes> [-h] - - fs sq [-p <dir/file path>] -m <max quota in kbytes> [-h] --
Description -
The fs setquota command sets the quota (maximum possible size) - of the read/write volume that contains the directory or file named by the - -path argument. -
To set the quota on multiple volumes at the same time, use the fs - setvol command. -
To display a volume's quota, use the fs examine, fs - listquota or fs quota command. -
Options -
Specify the read/write path to the file or directory, to avoid the failure - that results from attempting to change a read-only volume. By - convention, the read/write path is indicated by placing a period before the - cell name at the pathname's second level (for example, - /afs/.abc.com). For further discussion of the - concept of read/write and read-only paths through the filespace, see the - fs mkmount reference page. -
If the -path argument is omitted (to set the quota of the volume - housing the current working directory), the -max switch must be - included with this argument. -
Examples -
The following command imposes a maximum quota of 3000 kilobytes on the - volume that houses the /afs/abc.com/usr/smith - directory: -
% fs setquota -path /afs/abc.com/usr/smith -max 3000 - --
Privilege Required -
The issuer must belong to the system:administrators - group. -
Related Information -
fs quota -
-
- -
-
-
Purpose -
Sets the Cache Manager's preference ranks for file server or VL Server - machines -
Synopsis -
fs setserverprefs [-servers <fileserver names and ranks>+] - [-vlservers <VL server names and ranks>+] - [-file <input from named file>] [-stdin] [-help] - - fs sets [-se <fileserver names and ranks>+] [-vl <VL server names and ranks>+] - [-f <input from named file>] [-st] [-h] - - fs sp [-se <fileserver names and ranks>+] [-vl <VL server names and ranks>+] - [-f <input from named file>] [-st] [-h] --
Description -
The fs setserverprefs command sets the local Cache - Manager's preference ranks for one or more file server machine interfaces - or, if the -vlserver argument is provided, for Volume Location (VL) - Server machines. For file server machines, the numerical ranks - determine the order in which the Cache Manager attempts to contact the - interfaces of machines that are housing a volume. For VL Server - machines, the ranks determine the order in which the Cache Manager attempts to - contact a cell's VL Servers when requesting VLDB information. -
The fs getserverprefs reference page explains how the Cache - Manager uses preference ranks when contacting file server machines or VL - Server machines. The following paragraphs explain how the Cache Manager - calculates default ranks, and how to use this command to change the - defaults. -
Calculation of Default Preference Ranks -
The Cache Manager stores a preference rank in kernel memory as a paired IP - address and numerical rank. If a file server machine is multihomed, the - Cache Manager assigns a distinct rank to each of the machine's addresses - (up to the number of addresses that the VLDB can store per machine, which is - specified in the IBM AFS Release Notes). Once calculated, a - rank persists until the machine reboots, or until this command is used to - change it. -
The Cache Manager sets default VL Server preference ranks as it - initializes, randomly assigning a rank from the range 10,000 to 10,126 to each - of the machines listed in the local /usr/vice/etc/CellServDB - file. Machines from different cells can have the same rank, but this - does not present a problem because the Cache Manager consults only one - cell's ranks at a time. -
The Cache Manager sets default preference ranks for file server machine as - it fetches volume location information from the VLDB. Each time it - learns about file server machine interfaces for which it has not already set - ranks, it assigns a rank to each interface. If the local client machine - has only one IP address, the Cache Manager compares it to the server - interface's IP address and sets a rank according to the following - algorithm. If the client machine is multihomed, the Cache Manager - applies the algorithm to each of the client machine's addresses and - assigns to the file server machine interface the lowest rank that - results. -
After assigning a base rank to a file server machine interface, the Cache - Manager adds to it a number randomly chosen from the range 0 (zero) to - 14. As an example, a file server machine interface in the same - subnetwork as the local machine receives a base rank of 20,000, but the Cache - Manager records the actual rank as an integer between 20,000 and - 20,014. This process reduces the number of interfaces that have exactly - the same rank. As with VL Server machine ranks, it is possible for file - server machine interfaces from foreign cells to have the same rank as - interfaces in the local cell, but this does not present a problem. Only - the relative ranks of the interfaces that house a given volume are relevant, - and AFS only supports storage of a volume in one cell at a time. -
Setting Non-default Preference Ranks -
Use the fs setserverprefs command to reset an existing - preference rank, or to set the initial rank of a file server machine interface - or VL Server machine for which the Cache Manager has no rank. To make a - rank persist across a reboot of the local machine, place the appropriate - fs setserverprefs command in the machine's AFS initialization - file. -
Specify each preference rank as a pair of values separated by one or more - spaces: -
As with default ranks, the Cache Manager adds a randomly chosen integer to - a rank specified by this command. For file server machine interfaces, - the integer is from the range 0 (zero) to 14; for VL Server machines, it - is from the range 0 (zero) to 126. For example, if the administrator - assigns a rank of 15,000 to a file server machine interface, the Cache Manager - stores an integer between 15,000 to 15,014. -
There are several ways to provide ranks for file server machine interfaces - (but not for VL Server machines): -
When setting file server machine preference ranks, it is legal to combine - the -servers, -file, and -stdin options on a - single command line. If different options specify a different rank for - the same interface, the Cache Manager stores and uses the rank assigned with - the -servers argument. -
The -vlservers argument is the only way to assign VL Server - machine ranks. It can be combined with one or more of the - -servers, -file, and -stdin options, but the - Cache Manager applies the values provided for those options to file server - machine ranks only. -
The fs command interpreter does not verify hostnames or IP - addresses, and so assigns preference ranks to invalid machine names or - addresses. The Cache Manager never uses such ranks unless the same - incorrect information is in the VLDB. -
Options -
This argument can be combined with the -file argument, - -stdin flag, or both. If more than one of the arguments sets - a rank for the same interface, the rank set by this argument takes - precedence. It can also be combined with the -vlservers - argument, but does not interact with it. -
This argument can be combined with the -servers argument, - -file argument, -stdin flag, or any combination of the - three, but does not interact with any of them. They apply only to file - server machine ranks. -
This argument can be combined with the -servers argument, - -stdin flag, or both. If more than one of the arguments sets - a rank for the same interface, the rank set by the -server argument - takes precedence. It can also be combined with the - -vlservers argument, but does not interact with it. -
This argument can be combined with the -servers argument, the - -file argument, or both. If more than one of the arguments - sets a rank for the same interface, the rank set by the -server - argument takes precedence. It can also be combined with the - -vlservers argument, but does not interact with it. -
Examples -
The following command sets the Cache Manager's preference ranks for - the file server machines named fs3.abc.com and - fs4.abc.com, the latter of which is specified by its - IP address, 192.12.105.100. The machines reside in - another subnetwork of the local machine's network, so their default base - rank is 30,000. To increase the Cache Manager's preference for - these machines, the issuer assigns a rank of 25000, to which the - Cache Manager adds an integer in the range from 0 to 15. -
# fs setserverprefs -servers fs3.abc.com 25000 192.12.105.100 25000 - --
The following command uses the -servers argument to set the - Cache Manager's preference ranks for the same two file server machines, - but it also uses the -file argument to read a collection of - preference ranks from a file that resides in the local file - /etc/fs.prefs: -
# fs setserverprefs -servers fs3.abc.com 25000 192.12.105.100 25000 \ - -file /etc/fs.prefs - --
The /etc/fs.prefs file has the following contents and - format: -
192.12.108.214 7500 - 192.12.108.212 7500 - 138.255.33.41 39000 - 138.255.33.34 39000 - 128.0.45.36 41000 - 128.0.45.37 41000 - --
The following command uses the -stdin flag to read preference - ranks from the standard input stream. The ranks are piped to the - command from a program, calc_prefs, which was written by the issuer - to calculate preferences based on values significant to the local cell. -
# calc_prefs | fs setserverprefs -stdin - --
The following command uses the -vlservers argument to set the - Cache Manager's preferences for the VL server machines named - fs1.abc.com, fs3.abc.com, - and fs4.abc.com to base ranks of 1, 11000, and 65521, - respectively: -
# fs setserverprefs -vlservers fs1.abc.com 1 fs3.abc.com 11000 \ - fs4.abc.com 65521 - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
-
- -
-
-
Purpose -
Set maximum quota and messages for the volume containing a file or - directory -
Synopsis -
fs setvol [-path <dir/file path>+] [-max <disk space quota in 1K units>] - [-offlinemsg <offline message>] [-help] - - fs setv [-p <dir/file path>+] [-ma <disk space quota in 1K units>] - [-o <offline message>] [-h] - - fs sv [-p <dir/file path>+] [-ma <disk space quota in 1K units>] - [-o <offline message>] [-h] --
Description -
The fs setvol command sets the quota (maximum possible size) of - the read/write volume that contains each directory or file named by the - -path argument. To associate a message with the volume which - then appears in the output of the fs examine command, include the - -offlinemsg argument. -
To display all of the settings made with this command, use the fs - examine command. The fs listquota command reports a - fileset's quota, and the fs quota command the percent of quota - used. -
To set quota on one volume at a time, use the fs setquota - command. -
Options -
Specify the read/write path to the file or directory, to avoid the failure - that results from attempting to change a read-only volume. By - convention, the read/write path is indicated by placing a period before the - cell name at the pathname's second level (for example, - /afs/.abc.com). For further discussion of the - concept of read/write and read-only paths through the filespace, see the - fs mkmount reference page. -
If the -path argument is omitted (so that the command sets the - quota of the volume housing the current working directory), the - -max switch must be provided. -
Examples -
The following command imposes a 6500 kilobyte quota on the volumes mounted - at the home directories /afs/abc.com/usr/smith and - /afs/abc.com/usr/pat: -
% cd /afs/abc.com/usr - - % fs setvol -path smith pat -max 6500 - --
Privilege Required -
The issuer must belong to the system:administrators - group. -
Related Information -
fs quota -
-
- -
-
-
Purpose -
Enables asynchronous writes to the file server -
Synopsis -
fs storebehind [-kbytes <asynchrony for specified names>] - [-files <specific pathnames>+] - [-allfiles <new default (KB)>] [-verbose] [-help] - - fs st [-k <asynchrony for specified names>] [-f <specific pathnames>+] - [-a <new default (KB)>] [-v] [-h] --
Description -
The fs storebehind command enables the Cache Manager to perform - a delayed asynchronous write to the File Server when an application closes a - file. By default, the Cache Manager writes all data to the File Server - immediately and synchronously when an application program closes a - file--that is, the close system call does not return until the - Cache Manager has actually transferred the final chunk of the file to the File - Server. This command specifies the number of kilobytes of a file that - can still remain to be written to the File Server when the Cache Manager - returns control to the application. It is useful if users working on - the machine commonly work with very large files, but also introduces the - complications discussed in the Cautions section. -
Set either or both of the following in a single command: -
-
As an example, the following setting means that when an application closes - a file, the Cache Manager can return control to the application as soon as no - more than 10 kilobytes of the file remain to be written to the File - Server. -
-allfiles 10 - --
As an example, the following setting means that when an application closes - either of the files bigfile and biggerfile, the Cache - Manager can return control to the application as soon as no more than a - megabyte of the file remains to be written to the File Server. -
-kbytes 1024 -files bigfile biggerfile - --
Note that once an explicit value has been set for a file, the only way to - make it subject to the default store asynchrony once again is to set - -kbytes to that value. In other words, there is no - combination of arguments that automatically makes a file subject to the - default store asynchrony once another value has been set for the file. -
To display the settings that currently apply to individual files or to all - files, provide the command's arguments in certain combinations as - specified in the Output section of this reference page. -
Cautions -
For the following reasons, use of this command is not recommended in most - cases. -
In normal circumstances, an asynchronous setting results in the Cache - Manager returning control to applications earlier than it otherwise does, but - this is not guaranteed. -
If a delayed write fails, there is no way to notify the application, since - the close system call has already returned with a code indicating - success. -
Writing asynchronously increases the possibility that the user will not - notice if a write operation makes the volume that houses the file exceed its - quota. As always, the portion of the file that exceeds the - volume's quota is lost, which prompts a message such as the - following: -
No space left on device - --
To avoid losing data, it is advisable to verify that the volume housing the - file has space available for the amount of data anticipated to be - written. -
Options -
Output -
If none of the command's options are included, or if only the - -verbose flag is included, the following message reports the - default store asynchrony (the setting that applies to all files manipulated by - applications running on the local machine and for which not more specific - asynchrony is set). -
Default store asynchrony is x kbytes. - --
A value of 0 (zero) indicates synchronous writes and is the - default if no one has included the -allfiles argument on this - command since the machine last rebooted. -
If the -files argument is provided without the - -kbytes argument, the output reports the value that applies to each - specified file along with the default store asynchrony. If a particular - value has previously been set for a file, the following message reports - it: -
Will store up to y kbytes of file asynchronously. - Default store asynchrony is x kbytes. - --
If the default store asynchrony applies to a file because no explicit - -kbytes value has been set for it, the message is instead as - follows: -
Will store file according to default. - Default store asynchrony is x kbytes. - --
If the -verbose flag is combined with arguments that set values - (-files and -kbytes, or -allfiles, or all - three), there is a message that confirms immediately that the setting has - taken effect. When included without other arguments or flags, the - -verbose flag reports the default store asynchrony only. -
Examples -
The following command enables the Cache Manager to return control to the - application program that closed the file test.data when 100 - kilobytes still remain to be written to the File Server. The - -verbose flag produces output that confirms the new setting, and - that the default store asynchrony is zero. -
% fs storebehind -kbytes 100 -files test.data -verbose - Will store up to 100 kbytes of test.data asynchronously. - Default store asynchrony is 0 kbytes. - --
Privilege Required -
To include the -allfiles argument, the issuer must be logged in - as the local superuser root. -
To include the -kbytes and -files arguments, the - issuer must either be logged in as the local superuser root or have - the w (write) permission on the ACL of each file's - directory. -
To view the current settings (by including no arguments, the - -file argument alone, or the -verbose argument alone), - no privilege is required. -
Related Information -
afsd -
-
- -
-
-
Purpose -
Reports or sets the CPU/operating system type -
Synopsis -
fs sysname [-newsys <new sysname>] [-help] - - fs sy [-n <new sysname>] [-h] --
Description -
The fs sysname command sets or displays the local machine's - CPU/operating system type as recorded in kernel memory. The Cache - Manager substitutes the string for the @sys variable which can occur - in AFS pathnames; the IBM AFS Quick Beginnings and IBM - AFS Administration Guide explain how using @sys can simplify - cell configuration. It is best to use it sparingly, however, because it - can make the effect of changing directories unpredictable. -
The command always applies to the local machine only. If issued on - an NFS client machine accessing AFS via the NFS/AFS Translator, the string is - set or reported for the NFS client machine. The Cache Manager on the - AFS client machine serving as the NFS client's NFS/AFS translator machine - stores the value in its kernel memory, and so can provide the NFS client with - the proper version of program binaries when the user issues commands for which - the pathname to the binaries includes @sys. There is a - separate record for each user logged into the NFS client, which implies that - if a user adopts a new identity (UNIX UID) during a login session on the NFS - client--perhaps by using the UNIX su command--he or she - must verify that the correct string is set for the new identity also. -
Options -
Output -
When the -newsys argument is omitted, the output reports the - machine's system type in the following format: -
Current sysname is 'system_type' - --
Examples -
The following example shows the output produced on a Sun SPARCStation - running Solaris 5.7: -
% fs sysname - Current sysname is 'sun4x_57' - --
The following command defines a machine to be a IBM RS/6000 running AIX - 4.2: -
% fs sysname -newsys rs_aix42 - --
Privilege Required -
To display the current setting, no privilege is required. To include - the -newsys argument on an AFS client machine, the issuer must be - logged in as the local superuser root. -
Related Information -
sys -
IBM AFS Quick Beginnings -
IBM AFS Administration Guide -
-
- -
-
-
Purpose -
Reports the name of each file server machine housing a file or directory -
Synopsis -
fs whereis [-path <dir/file path>+] [-help] - - fs whe [-p <dir/file path>+] [-h] --
Description -
The fs whereis command returns the name of each file server - machine that houses the volume containing each directory or file named by the - -path argument. -
Options -
Output -
The output includes a line for each specified directory or file. It - names the file server machine on which the volume that houses the specified - directory or file resides. A list of multiple machines indicates that - the directory or file is in a replicated volume. -
Machine names usually have a suffix indicating their cell - membership. If the cell is not clear, use the fs whichcell - command to display the cell in which the directory or file resides. To - display the cell membership of the local machine, use the fs wscell - command. -
Examples -
The following example indicates that volume housing the directory - /afs/abc.com resides is replicated on both - fs1.abc.com and - fs3.abc.com: -
% fs whereis -path /afs/abc.com - File /afs/abc.com is on hosts fs1.abc.com fs3.abc.com - --
Privilege Required -
None -
Related Information -
-
- -
-
-
Purpose -
Returns the name of the cell to which a file or directory belongs -
Synopsis -
fs whichcell [-path <dir/file path>+] [-help] - - fs whi [-p <dir/file path>+] [-h] --
Description -
The fs whichcell command returns the name of the cell in which - the volume that houses each indicated directory or file resides. -
To display the file server machine on which the volume housing a directory - or file resides, use the fs whichcell command. To display - the cell membership of the local machine, use the fs wscell - command. -
Options -
Output -
The output includes a line for each directory or file, naming the cell to - which the volume that houses the directory or file resides. -
Examples -
The following example shows that the current working directory resides in a - volume in the ABC Corporation cell: -
% fs whichcell - File . lives in cell 'abc.com' - --
Privilege Required -
None -
Related Information -
-
- -
-
-
Purpose -
Returns the name of the cell to which a machine belongs -
Synopsis -
fs wscell [-help] - - fs ws [-h] --
Description -
The fs wscell command returns the name of the local - machine's home cell. -
Options -
Output -
The output displays the contents of the local - /usr/vice/etc/ThisCell file, in the format -
This workstation belongs to cell 'cellname' - --
Examples -
The following example results when the fs wscell is issued on a - machine in the State University cell: -
% fs wscell - This workstation belongs to cell 'stateu.edu' - --
Privilege Required -
None -
Related Information -
-
- -
-
-
Introduction to the fstrace command suite -
Description -
The commands in the fstrace command suite are the interface that - system administrators employ to trace Cache Manager operations for debugging - purposes. Examples of Cache Manager operations are fetching file data - or the status information used to produce output for the UNIX ls - command. -
The fstrace command interpreter defines an extensive set of - Cache Manager operations as the cm event set. - When the event set is activated, the Cache Manager writes a message to the - cmfx trace log in kernel memory each time it performs - one of the defined operations. The log expands only to a defined size - (by default, 60 KB), after which it is overwritten in a circular fashion (new - trace messages overwrite the oldest ones). If an operation of - particular interest occurs, the administrator can afterward display the log on - the standard output stream or write it to a file for later study. For - more specific procedural instructions, see the IBM AFS Administration - Guide. -
There are several categories of commands in the fstrace command - suite: -
fstrace clear, fstrace lslog, fstrace - setlog -
fstrace lsset and fstrace setset -
Options -
All fstrace commands accept the following optional flag. - It is listed in the command descriptions and described in detail here: - -
Privilege Required -
To issue most fstrace commands, the issuer must be logged on as - the local superuser root on the machine that is generating the - trace log. -
Related Information -
-
- -
-
-
Displays each help entry containing a keyword string -
Synopsis -
fstrace apropos -topic <help string> [-help] - - fstrace ap -t <help string> [-h] --
Description -
The fstrace apropos command displays the first line of the - online help entry for any fstrace command that contains in its name - or short description the string specified with the -topic - argument. -
To display a command's complete syntax, use the fstrace - help command. -
Options -
Output -
The first line of a command's online help entry names it and briefly - describes its function. This command displays the first line for any - fstrace command where the string specified with the - -topic argument is part of the command name or first line. -
Examples -
The following command lists all fstrace commands that include - the word set in their names or short descriptions: -
% fstrace apropos set - clear: clear logs by logname or by event set - lsset: list available event sets - setlog: set the size of a log - setset: set state of event sets - --
Privilege Required -
None -
Related Information -
fstrace -
-
- -
-
-
Purpose -
Clears the trace log -
Synopsis -
fstrace clear [-set <set_name>+] [-log <log_name>+] [-help] - - fstrace c [-s <set_name>+] [-l <log_name>+] [-h] --
Description -
The fstrace clear command erases the contents of the trace log - from kernel memory, but leaves kernel memory allocated for the log. -
Options -
Examples -
The following command clears the cmfx trace log on the local - machine: -
# fstrace clear - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
fstrace -
-
- -
-
-
Dumps a trace log -
Synopsis -
fstrace dump [-set <set_name>+] [-follow <log_name>] - [-file <output_filename>] - [-sleep <seconds_between_reads>] [-help] - - fstrace d [-se <set_name>+] [-fo <log_name>] [-fi <output_filename>] - [-sl <seconds_between_reads>] [-h] --
Description -
The fstrace dump command displays the current contents of the - cmfx trace log on the standard output stream or writes it to the - file named by the -file argument. -
To write the log continuously to the standard output stream or to a file, - use the -follow argument. By default, the log's - contents are written out every ten seconds and then automatically - cleared. To change the interval between writes, use the - -sleep argument. -
Cautions -
This command produces output only if the cm event set is - active. To display or set the event set's state, use the - fstrace lsset or fstrace setset command - respectively. -
To make the output from this command maximally readable, the message - catalog file called afszcm.cat must reside in the local - /usr/vice/etc/C directory. If necessary, copy the file to - that directory from the AFS Binary Distribution before activating - tracing. -
When the cm event set is active, a defined amount of kernel - memory (by default, 60 KB) is allocated for the cmfx trace - log. As described on the introductory fstrace reference - page, when the buffer is full, messages are overwritten in a circular fashion - (new messages overwrite the oldest ones). To allocate more kernel - memory for the log, use the fstrace setlog command; to display - the log buffer's current size, use the fstrace lslog command - with the -long argument. -
Options -
The only acceptable value is cmfx. Provide either this - argument or the -set argument, or omit both to write out the - cmfx log by default. -
Output -
The output begins with a header specifying the date and time at which the - write operation began. If the -follow argument is not - included, the header also reports the number of logs being dumped; it is - always 1, since there is only the cmfx trace log. - The format of the header is as follows: -
AFS Trace Dump - - Date: starting_timestamp - Found 1 logs. - Contents of log cmfx: - --
Each subsequent message describes a Cache Manager operation in the - following format: -
time timestamp, pid pid:event_message - --
where -
In addition, every 1024 seconds the fstrace command interpreter - writes a message that records the current clock time, in the following - format: -
time timestamp, pid pid: Current time: unix_time - --
where -
Use this message to determine the actual clock time associated with each - log message. Determine the actual time as follows: -
If any of the data in the kernel trace buffer has been overwritten since - tracing was activated, the following message appears at the appropriate place - in the output: -
Log wrapped; data missing. - --
To reduce the likelihood of overwriting, use the fstrace setlog - command to increase the kernel buffer's size. To display the - current defined buffer size, use the fstrace lslog command with the - -long argument. -
The following message at the end of the log dump indicates that it is - completed: -
AFS Trace Dump - Completed - --
Examples -
The following command dumps the log associated with the cm event - set to the standard output stream. -
# fstrace dump -set cm - AFS Trace Dump - - Date: Tue Apr 7 10:54:57 1998 - Found 1 logs. - time 32.965783, pid 0: Tue Apr 7 10:45:52 1998 - time 32.965783, pid 33657: Close 0x5c39ed8 flags 0x20 - time 32.965897, pid 33657: Gn_close vp 0x5c39ed8 flags 0x20 (returns 0x0) - time 35.159854, pid 10891: Breaking callback for 5bd95e4 states 1024 (volume 0) - time 35.407081, pid 10891: Breaking callback for 5c0fadc states 1024 (volume 0) - . - . - . - time 71.440456, pid 33658: Lookup adp 0x5bbdcf0 name g3oCKs \ - fid (756 4fb7e:588d240.2ff978a8.6) - time 71.440569, pid 33658: Returning code 2 from 19 - time 71.440619, pid 33658: Gn_lookup vp 0x5bbdcf0 name g3oCKs (returns 0x2) - time 71.464989, pid 38267: Gn_open vp 0x5bbd000 flags 0x0 (returns 0x0) - AFS Trace Dump - Completed - --
The following command dumps the trace log associated with the cm - event set on the local machine to the file - cmfx.dump.file.1, using the default interval - of 10 seconds between successive dumps: -
# fstrace dump -follow cmfx -file cmfx.dump.file.1 - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
fstrace -
-
- -
-
-
Displays the syntax of specified fstrace commands or lists - functional descriptions of all fstrace commands -
Synopsis -
fstrace help [-topic <help string>+] [-help] - - fstrace h [-t <help string>+] [-h] --
Description -
The fstrace help command displays the complete online help entry - (short description and syntax statement) for each command operation code - specified by the -topic argument. If the -topic - argument is omitted, the output includes the first line (name and short - description) of the online help entry for every fstrace - command. -
To list every fstrace command whose name or short description - includes a specified keyword, use the fstrace apropos - command. -
Options -
Output -
The online help entry for each fstrace command consists of two - or three lines: -
Examples -
The following command displays the online help entry for the fstrace - setset command: -
% fstrace help -topic setset - fstrace setset: set state of event sets - Usage: fstrace setset [-set <set_name>+] [-active] [-inactive] - [-dormant] [-help] - --
Privilege Required -
None -
Related Information -
fstrace -
-
- -
-
-
Displays information about a log -
Synopsis -
fstrace lslog [-set <set_name>+] [-log <log_name>] [-long] [-help] - - fstrace lsl [-s <set_name>+] [-log <log_name>] [-lon] [-h] --
Description -
The fstrace lslog command reports whether the cmfx - log is available for use. If the -long argument is included, - the output reports the log's defined size, and whether that amount of - space is currently allocated in kernel memory or not. -
To change the cmfx trace log's size, use the fstrace - setlog command. To display or set whether space is allocated for - it in kernel memory, use the fstrace lsset or fstrace - setset command to display or set the state of the corresponding - cm event set, respectively. -
Options -
Output -
By default, the fstrace lslog command displays only the name of - the available log, cmfx, in the following format: -
Available logs: - cmfx - --
When the -long flag is included, the output also reports the - defined size of the log in kilobytes, and whether or not that amount of space - is currently allocated in kernel memory, in the following format: -
Available logs: - cmfx : log_size kbytes (allocated | unallocated) - --
The allocated state indicates that the indicated number of - kilobytes is reserved for the cmfx trace log in kernel - memory. The cm event set's state is either - active or inactive, as reported by the fstrace - lsset command, and set by the fstrace setset command's - -active or -inactive flags respectively. -
The unallocated state indicates that no kernel memory is - currently reserved for the cmfx trace log. The cm - event set's state is dormant, as reported by the fstrace - lsset command and set by the fstrace setset command's - -dormant flag. If the event set's state is later - changed to active or inactive, the number of kilobytes indicated as - log_size are again allocated in kernel memory. -
Examples -
The following example uses the -long flag to display information - about the cmfx log: -
# fstrace lslog -log cmfx -long - Available logs: - cmfx : 60 kbytes (allocated) - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
fstrace -
-
- -
-
-
Reports the status of an event set -
Synopsis -
fstrace lsset [-set <set_name>+] [-help] - - fstrace lss [-s <set_name>+] [-h] --
Description -
The fstrace lsset command displays a list of the available event - sets and reports their current status (active, inactive, or dormant). -
To change an event set's status, use the fstrace setset - command. -
Options -
Output -
The output lists the available event sets and the status of each, in the - following format: -
Available sets: - cm {active | inactive | dormant} - --
where -
Examples -
The following example displays the available event set and its - status: -
# fstrace lsset - Available sets: - cm active - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
fstrace -
-
- -
-
-
Sets the size of a trace log -
Synopsis -
fstrace setlog [-log <log_name>+] -buffersize <1-kilobyte_units> [-help] - - fstrace setl [-l <log_name>+] -b <1-kilobyte_units> [-h] - - fstrace sl [-l <log_name>+] -b <1-kilobyte_units> [-h] --
Description -
The fstrace setlog command defines the number of kilobytes of - kernel memory allocated for the cmfx trace log. If kernel - memory is currently allocated, the command clears the current log and creates - a new log buffer of the specified size. -
To display the current defined size of the log buffer, issue the - fstrace lslog command with the -long argument. To - control whether the indicated amount of space is actually allocated, use the - fstrace setset command to set the status of the cm event - set; to display the event set's status, use the fstrace - lsset command. -
Options -
Examples -
The following command allocated 80 KB of kernel memory for the - cmfx trace log: -
# fstrace setlog -log cmfx -buffersize 80 - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
fstrace -
-
- -
-
-
Sets the status of an event set -
Synopsis -
fstrace setset [-set <set_name>+] [-active] [-inactive] [-dormant] [-help] - - fs set [-s <set_name>+] [-a] [-i] [-d] [-h] --
Description -
The fstrace setset command sets the status of the cm - kernel event set on the local machine, which determines whether trace messages - are recorded in the log buffer in kernel memory. -
Options -
Examples -
The following example sets the cm event set's status to - inactive: -
# fstrace setset -set cm -inactive - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
fstrace -
-
- -
-
-
Purpose -
Initializes the Internet File Transfer Protocol server -
Synopsis -
ftpd [-d] [-l] [-t <timeout>] [-v] [-T <MaxTimeOut>] [-u] [-s] --
Description -
The AFS-modified ftpd program functions like the standard UNIX - ftpd program, but also authenticates the issuer of the - ftp command (who is presumably working on a remote machine) with - the Authentication Server in the local cell (the home cell of the machine - where the ftpd process is running, as defined in the local - /usr/vice/etc/ThisCell file). The authentication is based on - the user name and password provided at the ftp> prompts on the - remote machine. The Cache Manager on the machine running the - ftpd process stores the newly created token, identifying it by - process authentication group (PAG) rather than by the user's UNIX - UID. -
The issuer of the ftp command can be working in a foreign cell, - as long as the user name and password provided are valid in the cell where the - ftpd process is running. If the user name under which the - ftp command is issued does not exist in the Authentication Database - for the cell where the ftpd process is running, or the issuer - provides the wrong password, then the ftpd process logs the user - into the local file system of the machine where the ftpd process is - running. The success of this local login depends on the user name - appearing in the local password file and on the user providing the correct - local password. In the case of a local login, AFS server processes - consider the issuer of the ftp command to be the user - anonymous. -
In the recommended configuration, the AFS version of the ftpd - process is substituted for the standard version (only one of the versions can - run at a time). The administrator then has two choices: -
Cautions -
The AFS distribution does not include an AFS-modified version of this - command for every system type. On system types that use an integrated - authentication system, it is appropriate instead to control the - ftpd daemon's handling of AFS authentication through the - integrated system. For example, on system types that use the Pluggable - Authentication Module (PAM), add an ftpd entry that references the - AFS PAM module to the PAM configuration file. For instructions on - incorporating AFS into a machine's integrated authentication system, see - the IBM AFS Quick Beginnings. -
Some system types impose the following requirement. If the issuer of - the ftp command on the remote machine is using a shell other than - /bin/csh, then the /etc/shells file on the local disk of - the machine being accessed (the machine running the ftpd process) - must include an entry for the alternate shell. -
Options -
Privilege Required -
See the UNIX manual page for the ftpd process. -
Related Information -
UNIX manual page for ftp -
UNIX manual page for ftpd -
IBM AFS Quick Beginnings -
-
- -
-
-
Purpose -
Initializes the Internet service daemon -
Synopsis -
inetd [-d] [<configfile>] --
Description -
The AFS-modified inetd program functions like the standard UNIX - inetd program, but also enables users of the remote services it - supports to access them as authenticated AFS users, provided that the - supported services are also AFS-modified versions that pass AFS tokens - (authentication information). Examples of supported services are the - rcp and rsh programs. -
The AFS inetd program can service the standard UNIX versions of - the remote services, but it is instead recommended that the standard UNIX - version of the inetd program be run in parallel with the AFS - version. Name the AFS version something like - inetd.afs and use it to service requests from AFS-modified - programs; use the standard inetd program to service requests - from standard UNIX programs. This separation requires using two - different inetd.conf files, as described in the following - section. -
Cautions -
Several configuration changes are necessary for token passing to work - correctly with the AFS version of the inetd program. There - are possibly other UNIX-based requirements or restrictions not mentioned - here; consult the UNIX manual page. (One important restriction is - that there can be no blank lines in the configuration file other than at the - end.) -
The requirements and restrictions include the following. They assume - that the inetd.afs process is running in parallel with the - standard inetd process. -
ta-rauth stream tcp nowait root internal ta-rauth - shell stream tcp nowait root /usr/etc/rshd rshd - login stream tcp nowait root /usr/etc/rlogind rlogind --
Substitute appropriate values for the binary locations and names in the - instructions, particularly for the shell and login - processes. Include the login instruction only if the - AFS-modified versions of login utilities are also in use in the cell; - otherwise, refer to login in the standard - inetd.conf instead. -
Note also that some system types use different process names. For - example, on Sun system types change rshd to - in.rshd and rlogind.afs to - in.rlogind.afs in the shell and - login instructions, respectively. -
Options -
See the UNIX manual page for the inetd program. -
Examples -
The following are sample inetd.conf.afs and - inetd.conf files, appropriate for use when the - inetd.afs program is running in parallel with the standard - inetd and AFS-modified login utilities are being used in the - cell. Changes to the standard inetd.conf file include - referencing the AFS version of the ftpd binary and commenting out - the shell and login lines. The example - inetd.conf file does not include the extra fifth - column. Do not use these examples without modifying them appropriately - for the local machine type or cell. -
# AFS version of Internet server configuration database - #(EXAMPLE ONLY) - # - ta-rauth stream tcp nowait root internal ta-rauth - shell stream tcp nowait root /usr/etc/rshd rshd - login stream tcp nowait root /usr/etc/rlogind rlogind - - # Standard version of Internet server configuration database - #(EXAMPLE ONLY) - # - ftp stream tcp nowait /etc/ftpd.afs ftpd.afs - telnet stream tcp nowait /etc/telnetd telnetd - #shell stream tcp nowait /etc/rshd rshd - #login stream tcp nowait /etc/rlogind rlogind - finger stream tcp nowait /usr/etc/fingd fingd - uucp stream tcp nowait /etc/uucpd uucpd - exec stream tcp nowait /etc/rexecd rexecd - comsat dgram udp wait /etc/comsat comsat - talk dgram udp wait /etc/talkd talkd - ntalk dgram udp wait /usr/etc/ntalkd talkd - time dgram udp wait /etc/miscd timed --
Privilege Required -
See the UNIX manual page for the inetd program. -
Related Information -
UNIX manual page for inetd -
-
- -
-
-
Purpose -
Checks the integrity of the Authentication Database -
Synopsis -
kadb_check -database <kadb_file> [-uheader] [-kheader] [-entries] - [-verbose] [-rebuild <out_file>] [-help] - - kadb_check -d <kadb_file> [-u] [-k] [-e] [-v] [-r <out_file>] [-h] --
Description -
The kadb_check command checks the integrity of the Protection - Database, reporting any errors or corruption it finds. If there are - problems, do not issue any kas commands until the database is - repaired. -
Cautions -
The results can be unpredictable if the Authentication Server makes changes - to the Authentication Database while this command is running. Use the - bos shutdown command to shutdown the local kaserver - process before running this command, or before creating a second copy of the - kaserver.DB0 file (with a different name) on which to run - the command. -
Options -
Output -
If there are errors in the database, the output always reports them on the - standard error stream. If any options other than -database - or -help are provided, the output written to the standard output - stream includes additional information as described for each option in the - preceding Options section of this reference page. The output - is intended for debugging purposes and is meaningful to someone familiar with - the internal structure of the Authentication Database. -
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
kaserver.DB0 and kaserver.DBSYS1 -
kaserver -
-
- -
-
-
Purpose -
Introduction to the kas command suite -
Description -
The commands in the kas command suite are the administrative - interface to the Authentication Server, which runs on each database server - machine in a cell, maintains the Authentication Database, and provides the - authentication tickets that client applications must present to AFS servers in - order to obtain access to AFS data and other services. -
There are several categories of commands in the kas command - suite: -
Because of the sensitivity of information in the Authentication Database, - the Authentication Server authenticates issuers of kas commands - directly, rather than accepting the standard token generated by the Ticket - Granting Service. Any kas command that requires - administrative privilege prompts the issuer for a password. The - resulting ticket is valid for six hours unless the maximum ticket lifetime for - the issuer or the Authentication Server's Ticket Granting Service is - shorter. - - -
To avoid having to provide a password repeatedly when issuing a sequence of - kas commands, enter interactive mode by issuing the - kas interactive command, typing kas without any - operation code, or typing kas followed by a user and cell name, - separated by an at-sign (@; an example is kas - smith.admin@abc.com). After prompting once for a - password, the Authentication Server accepts the resulting token for every - command issued during the interactive session. See the reference page - for the kas interactive command for a discussion of when to use - each method for entering interactive mode and of the effects of entering a - session. -
The Authentication Server maintains two databases on the local disk of the - machine where it runs: -
Options -
The following arguments and flags are available on many commands in the - kas suite. (Some of them are unavailable on commands entered - in interactive mode, because the information they specify is established when - entering interactive mode and cannot be changed except by leaving interactive - mode.) The reference page for each command also lists them, but they - are described here in greater detail. -
-
The -cell argument is not available on commands issued in - interactive mode. The cell defined when the kas command - interpreter enters interactive mode applies to all commands issued during the - interactive session. - -
Privilege Required -
To issue most kas commands, the issuer must have the - ADMIN flag set in his or her Authentication Database entry (use the - kas setfields command to turn the flag on). -
Related Information -
kaserver.DB0 and kaserver.DBSYS1 -
kas help -
kas list -
kas quit -
kaserver -
-
- -
-
-
Purpose -
Displays each help entry containing a keyword string -
Synopsis -
kas apropos -topic <help string> [-help] - - kas a -t <help string> [-h] --
Description -
The kas apropos command displays the first line of the online - help entry for any kas command that has the string specified by the - -topic argument in its name or short description. -
To display the syntax for a command, use the kas help - command. -
Options -
Output -
The first line of a command's online help entry names it and briefly - describes its function. This command displays the first line for any - kas command where the string specified with the -topic - argument is part of the command name or first line. -
Examples -
The following command lists all kas commands that include the - word key in their names or short descriptions: -
% kas apropos key - setkey: set a user's key - stringtokey: convert a string to a key - --
Privilege Required -
None, and no password is required. -
Related Information -
kas -
kas help -
-
- -
-
-
Purpose -
Creates an entry in the Authentication Database -
Synopsis -
kas create -name <name of user> [-initial_password <initial password>] - [-admin_username <admin principal to use for authentication>] - [-password_for_admin <admin password>] [-cell <cell name>] - [-servers <explicit list of authentication servers>+] - [-noauth] [-help] - - kas c -na <name of user> [-i <initial password>] - [-a <admin principal to use for authentication>] - [-p <admin password>] [-c <cell name>] - [-s <explicit list of authentication servers>+] [-no] [-h] --
Description -
The kas create command creates an entry in the Authentication - Database for the user named by the -name argument. -
To avoid having the account's initial password echo visibly at the - shell prompt, omit the -initial_password argument; the command - interpreter prompts for the password and does not echo it visibly. - Whether or not -initial_password is omitted, the Authentication - Server converts the password into a form suitable for use as an encryption - key, and records it in the entry's key field. -
To alter settings in an Authentication Database entry, use the kas - setfields command. To examine an entry, use the kas - examine command. To list every entry in the database, use the - kas list command. -
Options -
Examples -
The following example shows the prompts that appear when an administrator - logged in as admin creates an Authentication Database entry for the - user smith, and does not include either the - -initial_password or -password_for_admin - arguments. -
% kas create smith - Password for admin: - initial_password: - Verifying, please re-enter initial_password: - --
Privilege Required -
The issuer must have the ADMIN flag set on his or her - Authentication Database entry. -
Related Information -
kas -
kas list -
-
- -
-
-
Purpose -
Deletes an entry from the Authentication Database -
Synopsis -
kas delete -name <name of user> - [-admin_username <admin principal to use for authentication>] - [-password_for_admin <admin password>] [-cell <cell name>] - [-servers <explicit list of authentication servers>+] - [-noauth] [-help] - - kas d -na <name of user> [-a <admin principal to use for authentication>] - [-p <admin password>] [-c <cell name>] - [-s <explicit list of authentication servers>+] [-no] [-h] - - kas rm -na <name of user> [-a <admin principal to use for authentication>] - [-p <admin password>] [-c <cell name>] - [-s <explicit list of authentication servers>+] [-no] [-h] --
Description -
The kas delete command removes from the Authentication Database - the user entry named by the -name argument. The indicated - user becomes unable to log in, or the indicated server becomes unreachable - (because the Authentication Server's Ticket Granting Service module no - longer has a key with which to seal tickets for the server). -
Options -
Examples -
The following example shows the administrative user admin - entering interactive mode to delete three accounts. -
% kas - Password for admin: - ka> delete smith - ka> delete pat - ka> delete terry - --
Privilege Required -
The issuer must have the ADMIN flag set on his or her - Authentication Database entry. -
Related Information -
kas -
-
- -
-
-
Purpose -
Displays information from an Authentication Database entry -
Synopsis -
kas examine -name <name of user> [-showkey] - [-admin_username <admin principal to use for authentication>] - [-password_for_admin <admin password>] [-cell <cell name>] - [-servers <explicit list of authentication servers>+] - [-noauth] [-help] - - kas e -na <name of user> [-sh] - [-a <admin principal to use for authentication>] - [-p <admin password>] [-c <cell name>] - [-se <explicit list of authentication servers>+] [-no] [-h] --
Description -
The kas examine command formats and displays information from - the Authentication Database entry of the user named by the -name - argument. -
To alter the settings displayed with this command, issue the kas - setfields command. -
Cautions -
Displaying actual keys on the standard output stream by including the - -showkey flag constitutes a security exposure. For most - purposes, it is sufficient to display a checksum. -
Options -
Output -
The output includes: -
Examples -
The following example command shows the user smith displaying - her own Authentication Database entry. Note the ADMIN flag, - which shows that smith is privileged. -
% kas examine smith - Password for smith: - User data for smith (ADMIN) - key (0) cksum is 3414844392, last cpw: Thu Mar 25 16:05:44 1999 - password will expire: Fri Apr 30 20:44:36 1999 - 5 consecutive unsuccessful authentications are permitted. - The lock time for this user is 25.5 minutes. - User is not locked. - entry never expires. Max ticket lifetime 100.00 hours. - last mod on Tue Jan 5 08:22:29 1999 by admin - permit password reuse - --
In the following example, the user pat examines his - Authentication Database entry to determine when the account lockout currently - in effect will end. -
% kas examine pat - Password for pat: - User data for pat - key (0) cksum is 73829292912, last cpw: Wed Apr 7 11:23:01 1999 - password will expire: Fri Jun 11 11:23:01 1999 - 5 consecutive unsuccessful authentications are permitted. - The lock time for this user is 25.5 minutes. - User is locked until Tue Sep 21 12:25:07 1999 - entry expires on never. Max ticket lifetime 100.00 hours. - last mod on Thu Feb 4 08:22:29 1999 by admin - permit password reuse - --
In the following example, an administrator logged in as admin - uses the -showkey flag to display the octal digits that constitute - the key in the afs entry. -
% kas examine -name afs -showkey - Password for admin: admin_password - User data for afs - key (12): \357\253\304\352\234\236\253\352, last cpw: no date - entry never expires. Max ticket lifetime 100.00 hours. - last mod on Thu Mar 25 14:53:29 1999 by admin - permit password reuse - --
Privilege Required -
A user can examine his or her own entry. To examine others' - entries or to include the -showkey flag, the issuer must have the - ADMIN flag set in his or her Authentication Database entry. -
Related Information -
kas -
klog -
kpasswd -
-
- -
-
-
Purpose -
Discards all tickets for the issuer -
Synopsis -
kas forgetticket [-all] [-help] - - kas f [-a] [-h] --
Description -
The kas forgetticket command discards all of the issuer's - tickets stored in the local machine's kernel memory. This includes - the AFS server ticket from each cell in which the user has authenticated, and - any tickets that the user have acquired during the current kas - session (either when entering the session or by using the kas - getticket command). -
Options -
Examples -
The following command discards all of the issuer's tickets. -
% kas forgetticket - --
Privilege Required -
None, and no password is required. -
Related Information -
kas -
-
- -
-
-
Purpose -
Displays the syntax of each specified kas command or lists - functional descriptions of all kas commands -
Synopsis -
kas help [-topic <help string>+] [-help] - - kas h [-t <help string>+] [-h] --
Description -
The kas help command displays the complete online help entry - (short description and syntax statement) for each command operation code - specified by the -topic argument. If the -topic - argument is omitted, the output includes the first line (name and short - description) of the online help entry for every kas command. -
To list every kas command whose name or short description - includes a specified keyword, use the kas apropos command. -
Options -
Output -
The online help entry for each kas command consists of the - following two or three lines: -
Examples -
The following command displays the online help entry for the kas - setpassword command: -
% kas help setpassword - kas setpassword: set a user's password - aliases: sp - Usage: kas setpassword -name <name of user> - [-new_password <new password>] [-kvno <key version number>] - [-admin_username <admin principal to use for authentication>] - [-password_for_admin <password>] [-cell <cell name>] - [-servers <explicit list of authentication servers>+] [-help] - --
Privilege Required -
None, and no password is required. -
Related Information -
kas -
-
- -
-
-
Purpose -
Enters interactive mode -
Synopsis -
kas interactive [-admin_username <admin principal to use for authentication>] - [-password_for_admin <admin password>] [-cell <cell name>] - [-servers <explicit list of authentication servers>+] - [-noauth] [-help] - - kas i [-a <admin principal to use for authentication>] - [-p <admin password>] [-c <cell name>] - [-s <explicit list of authentication servers>+] [-n] [-h] --
Description -
The kas interactive command establishes an interactive session - for the issuer of the command. By default, the command interpreter - establishes an authenticated connection for the user logged into the local - file system with all of the Authentication Servers listed in the local - /usr/vice/etc/CellServDB file for the cell named in the local - /usr/vice/etc/ThisCell file. To specify an alternate - identity, cell name, or list of Authentication Servers, include the - -admin_username, -cell, or -servers arguments - respectively. Interactive mode lasts for six hours unless the maximum - ticket lifetime for the issuer or the Authentication Server's Ticket - Granting Service is shorter. -
There are two other ways to enter interactive mode, in addition to the - kas interactive command: -
There are several consequences of entering interactive mode: -
The issuer's identity and password, the relevant cell, and the set of - Authentication Server machines specified when entering interactive mode apply - to all commands issued during the session. They cannot be changed - without leaving the session, except by using the (kas) - noauthentication command to replace the current authenticated - connections with unauthenticated ones. The -admin_username, - -password_for_admin, -cell, and -servers - arguments are ignored if provided on a command issued during interactive - mode. -
To establish an unauthenticated connection to the Authentication Server, - include the -noauth flag or provide an incorrect password. - Unless authorization checking is disabled on each Authentication Server - machine involved, however, it is not possible to perform any privileged - operations within such a session. -
To end the current authenticated connection and establish an - unauthenticated one, issue the (kas) noauthentication - command. To leave interactive mode and return to the regular shell - prompt, issue the (kas) quit command. -
Options -
Examples -
The following example shows a user entering interactive mode as the - privileged user admin. -
% kas interactive admin - Password for admin: admin_password - ka> - --
Privilege Required -
None -
Related Information -
kas -
kas quit -
-
- -
-
-
Purpose -
Displays all entries in the Authentication Database -
Synopsis -
kas list [-long] [-showadmin] [-showkey] - [-admin_username <admin principal to use for authentication>] - [-password_for_admin <admin password>] [-cell <cell name>] - [-servers <explicit list of authentication servers>+] - [-noauth] [-help] - - kas ls [-l] [-showa] [-showk] - [-a <admin principal to use for authentication>] - [-p <admin password>] [-c <cell name>] - [-se <explicit list of authentication servers>+] [-n] [-h] --
Description -
The kas list command either displays all entries from the - Authentication Database by name, or displays the full database entry for a - defined set of entries, as determined by the flag provided: -
By default, full entries include a checksum for the encryption key, rather - than the actual octal digits that constitute the key. To display the - octal digits, include the -showkey flag with the -long - or -showadmin flag. -
Options -
Output -
If neither the -long or -showadmin flag is provided, - the output lists the name of each entry in the Authentication Database on its - own line. -
If the -long flag is included, the output includes every - Authentication Database entry in full. If the -showadmin - flag is included, the output includes in full only the Authentication Database - entries that have the ADMIN flag set. If the - -showkey is provided along with either one, the output includes the - octal digits that constitute the encryption key in each entry. -
A full Authentication Database entry includes the same information - displayed by the kas examine command; for details, see that - command's reference page. -
Privilege Required -
The issuer must have the ADMIN flag set on his or her - Authentication Database entry. -
Related Information -
kas -
-
- -
-
-
Purpose -
Displays all of the issuer's tickets (tokens) -
Synopsis -
kas listtickets [-name <name of server>] [-long] [-help] - - kas listt [-n <name of server>] [-l] [-h] --
Description -
The kas listtickets command displays the associated user ID (AFS - UID), cell name, and expiration date of some or all of the issuer's - tickets (tokens), depending on which options are provided: -
Options -
Output -
The output reports the AFS UID of the user who owns the token, the service - (usually, afs) and cell for which it is valid, and its expiration - date, using the following format. If the message does not specify a - cell, the ticket is for the local cell. -
User's (AFS ID AFS UID) tokens for service[@cellname] [Expires date] - --
If the -long flag is provided, the output also includes the - octal numbers making up the session key and token, along with the key version - number and the number of bytes in the token (if the number of bytes is not 56, - there is an error). -
If the marker [>> POSTDATED <] appears instead of an - expiration date, the ticket does not become valid until the indicated - time. (Only internal calls can create a postdated ticket; there is - no standard interface that allows users to do this.) -
Examples -
The following two examples are for a user with AFS UID 1020 in the - abc.com cell and AFS UID 35 in the - test.abc.com cell. He is working on a machine - in the first cell and is authenticated in both cells. -
% kas listtickets - User's (AFS ID 1020) tokens for afs [Expires Wed Mar 31 9:30:54 1999] - User's (AFS ID 35@test.abc.com) tokens for afs@test.abc.com \ - [Expires Wed Mar 31 13:54:26 1999] - - % kas listtickets -name afs -long - User's (AFS ID 1020) tokens for afs [Expires Wed Mar 31 9:30:54 1999] - SessionKey: \375\205\351\227\032\310\263\013 - Ticket: (kvno = 0, len = 56): \033\005\221\156\203\278\312\058\016\133 (etc.) - --
Privilege Required -
None, and no password is required. -
Related Information -
kas -
tokens -
-
- -
-
-
Purpose -
Discards an authenticated identity in interactive mode -
Synopsis -
noauthentication [-help] - - n [-h] --
Description -
The kas noauthentication command closes the (presumably - authenticated) connection that the issuer established with one or more - Authentication Server processes when entering interactive mode. It - opens a new unauthenticated connection to each server, assigning the issuer - the unprivileged identity anonymous. It does not actually - discard the user's tokens from the Cache Manager's memory (as the - unlog or kas forgetticket command does). Unless - authorization checking is disabled on each Authentication Server machine, it - becomes impossible to perform any privileged operations within the session - established by this command. -
This command is operative only during interactive mode, so omit the - kas command suite name from the command line. -
Options -
Examples -
The following example command discards the authentication information with - which the user entered interactive mode. -
ka> noauthentication - --
Privilege Required -
None, and no password is required. -
Related Information -
kas -
unlog -
-
- -
-
-
Purpose -
Leaves interactive mode -
Synopsis -
quit [-help] - - q [-h] --
Description -
The kas quit command ends interactive mode, severing the - authenticated connection to one or more Authentication Server processes and - returning the issuer to the normal shell prompt. -
This command is operative only during interactive mode, so omit the - kas command suite name from the command line. -
Options -
Examples -
The following example demonstrates how the normal command shell prompt - returns when the issuer leaves interactive mode. -
ka> quit - % - --
Privilege Required -
None, and no password is required. -
Related Information -
kas -
-
- -
-
-
Purpose -
Sets optional characteristics in an Authentication Database entry -
Synopsis -
kas setfields -name <name of user> - [-flags <hex flag value or flag name expression>] - [-expiration <date of account expiration>] - [-lifetime <maximum ticket lifetime>] - [-pwexpires <number days password is valid ([0..254])>] - [-reuse <permit password reuse (yes/no)>] - [-attempts <maximum successive failed login tries ([0..254])>] - [-locktime <failure penalty [hh:mm or minutes]>] - [-admin_username <admin principal to use for authentication>] - [-password_for_admin <admin password>] [-cell <cell name>] - [-servers <explicit list of authentication servers>+] - [-noauth] [-help] - - kas setf -na <name of user> [-f <hex flag value or flag name expression>] - [-e <date of account expiration>] [-li <maximum ticket lifetime>] - [-pw <number days password is valid ([0..254])>] - [-r <permit password reuse (yes/no)>] - [-at <maximum successive failed login tries ([0..254])>] - [-lo <failure penalty [hh:mm or minutes]>] - [-ad <admin principal to use for authentication>] - [-pa <admin password>] [-c <cell name>] - [-s <explicit list of authentication servers>+] [-no] [-h] - - kas sf -na <name of user> [-f <hex flag value or flag name expression>] - [-e <date of account expiration>] [-li <maximum ticket lifetime>] - [-pw <number days password is valid ([0..254])>] - [-r <permit password reuse (yes/no)>] - [-at <maximum successive failed login tries ([0..254])>] - [-lo <failure penalty [hh:mm or minutes]>] - [-ad <admin principal to use for authentication>] - [-pa <admin password>] [-c <cell name>] - [-s <explicit list of authentication servers>+] [-no] [-h] --
Description -
The kas setfields command changes the Authentication Database - entry for the user named by the -name argument in the manner - specified by the various optional arguments, which can occur singly or in - combination: -
The kas examine command displays the settings made with this - command. -
Cautions -
The password lifetime set with the -pwexpires argument begins at - the time the user's password was last changed, rather than when this - command is issued. It can therefore be retroactive. If, for - example, a user changed her password 100 days ago and the password lifetime is - set to 100 days or less, the password effectively expires immediately. - To avoid retroactive expiration, instruct the user to change the password just - before setting a password lifetime. -
Administrators whose authentication accounts have the ADMIN flag - enjoy complete access to the sensitive information in the Authentication - Database. To prevent access by unauthorized users, use the - -attempts argument to impose a fairly strict limit on the number of - times that a user obtaining administrative tokens can provide an incorrect - password. Note, however, that there must be more than one account in - the cell with the ADMIN flag. The kas unlock - command requires the ADMIN privilege, so it is important that the - locked-out administrator (or a colleague) can access another - ADMIN-privileged account to unlock the current account. -
In certain circumstances, the mechanism used to enforce the number of - failed authentication attempts can cause a lockout even though the number of - failed attempts is less than the limit set by the -attempts - argument. Client-side authentication programs such as klog - and an AFS-modified login utility normally choose an Authentication Server at - random for each authentication attempt, and in case of a failure are likely to - choose a different Authentication Server for the next attempt. The - Authentication Servers running on the various database server machines do not - communicate with each other about how many times a user has failed to provide - the correct password to them. Instead, each Authentication Server - maintains its own separate copy of the auxiliary database file - kaserverauxdb (located in the /usr/afs/local directory - by default), which records the number of consecutive authentication failures - for each user account and the time of the most recent failure. This - implementation means that on average each Authentication Server knows about - only a fraction of the total number of failed attempts. The only way to - avoid allowing more than the number of attempts set by the - -attempts argument is to have each Authentication Server allow only - some fraction of the total. More specifically, if the limit on failed - attempts is f, and the number of Authentication Servers is - S, then each Authentication Server can only permit a number of - attempts equal to f divided by S (the Ubik - synchronization site for the Authentication Server tracks any remainder, - fmodS). -
Normally, this implementation does not reduce the number of allowed - attempts to less than the configured limit (f). If one - Authentication Server refuses an attempt, the client contacts another instance - of the server, continuing until either it successfully authenticates or has - contacted all of the servers. However, if one or more of the - Authentication Server processes is unavailable, the limit is effectively - reduced by a percentage equal to the quantity U divided by - S, where U is the number of unavailable servers and - S is the number normally available. -
To avoid the undesirable consequences of setting a limit on failed - authentication attempts, note the following recommendations: -
Options -
-
Acceptable values for the year range from 1970 (1 January 1970 - is time 0 in the standard UNIX date representation) through 2037 - (2037 is the maximum because the UNIX representation cannot accommodate dates - later than a value in February 2038). -
Specify an integer that represents a number of seconds (3600 - equals one hour), or include a colon in the number to indicate a number of - hours and minutes (10:00 equals 10 hours). If this - argument is omitted, the default setting is 100:00 hours (360000 - seconds). -
When the password expires, the user is unable to authenticate, but has 30 - days after the expiration date in which to use the kpasswd command - to change the password (after that, only an administrator can change it by - using the kas setpassword command). Note that the clock - starts at the time the password was last changed, not when the kas - setfields command is issued. To avoid retroactive expiration, - have the user change the password just before issuing a command that includes - this argument. -
Specify a number of hours and minutes (hh:mm) or - minutes only (mm), from the range 01 (one minute) through - 36:00 (36 hours). The kas command - interpreter automatically reduces any larger value to 36:00 - and also rounds up any non-zero value to the next higher multiple of - 8.5 minutes. A value of 0 (zero) sets an infinite - lockout time; an administrator must issue the kas unlock - command to unlock the account. -
Examples -
In the following example, an administrator using the admin - account grants administrative privilege to the user smith, and sets - the Authentication Database entry to expire at midnight on 31 December - 2000. -
% kas setfields -name smith -flags ADMIN -expiration 12/31/2000 - Password for admin: - --
In the following example, an administrator using the admin - account sets the user pat's password to expire in 60 days from - when it last changed, and prohibits reuse of passwords. -
% kas setfields -name pat -pwexpires 60 -reuse no - Password for admin: - --
Privilege Required -
The issuer must have the ADMIN flag set on his or her - Authentication Database entry. -
Related Information -
kas -
klog -
kpasswd -
-
- -
-
-
Purpose -
Changes the key field in an Authentication Database entry -
Synopsis -
kas setpassword -name <name of user> [-new_password <new password>] - [-kvno <key version number>] - [-admin_username <admin principal to use for authentication>] - [-password_for_admin <admin password>] [-cell <cell name>] - [-servers <explicit list of authentication servers>+] - [-noauth] [-help] - - kas setpasswd -na <name of user> [-ne <new password>] - [-k <key version number>] - [-a <admin principal to use for authentication>] - [-p <admin password>] [-c <cell name>] - [-s <explicit list of authentication servers>+] [-no] [-h] - - kas setp -na <name of user> [-ne <new password>] [-k <key version number>] - [-a <admin principal to use for authentication>] - [-p <admin password>] [-c <cell name>] - [-s <explicit list of authentication servers>+] [-no] [-h] - - kas sp -na <name of user> [-ne <new password>] [-k <key version number>] - [-a <admin principal to use for authentication >] - [-p <admin password>] [-c <cell name>] - [-s <explicit list of authentication servers>+] [-no] [-h] --
Description -
The kas setpassword command accepts a character string of - unlimited length, scrambles it into a form suitable for use as an encryption - key, places it in the key field of the Authentication Database entry named by - the -name argument, and assigns it the key version number specified - by the -kvno argument. -
To avoid making the password string visible at the shell prompt, omit the - -new_password argument. Prompts then appear at the shell - which do not echo the password visibly. -
When changing the afs server key, also issue bos - addkey command to add the key (with the same key version number) to the - /usr/afs/etc/KeyFile file. See the IBM AFS - Administration Guide for instructions. -
The command interpreter checks the password string subject to the following - conditions: -
Password was not changed because it seems like a reused password - --
To prevent a user from subverting this restriction by changing the password - twenty times in quick succession (manually or by running a script), use the - -minhours argument on the kaserver initialization - command. The following error message appears if a user attempts to - change a password before the minimum time has passed: -
Password was not changed because you changed it too - recently; see your systems administrator - --
Options -
Examples -
In the following example, an administrator using the admin - account changes the password for pat (presumably because - pat forgot the former password or got locked out of his account in - some other way). -
% kas setpassword pat - Password for admin: - new_password: - Verifying, please re-enter new_password: - --
Privilege Required -
Individual users can change their own passwords. To change another - user's password or the password (server encryption key) for server - entries such as afs, the issuer must have the ADMIN flag - set in his or her Authentication Database entry. -
Related Information -
kas -
kaserver -
kpwvalid -
-
- -
-
-
Purpose -
Displays statistics from an Authentication Server process -
Synopsis -
kas statistics [-admin_username <admin principal to use for authentication>] - [-password_for_admin <admin password>] [-cell <cell name>] - [-servers <explicit list of authentication servers>+] - [-noauth] [-help] - - kas sta [-a <admin principal to use for authentication>] - [-p <admin password>] [-c <cell name>] - [-s <explicit list of authentication servers>+] [-n] [-h] --
Description -
The kas statistics command displays statistics from the - Authentication Server running on one of the cell's database server - machines. Use the -servers argument to name a specific - machine, or the command interpreter chooses one at random from all the - database server machines with which it has established connections. -
Cautions -
The -servers argument is not available in interactive mode, - making it impossible to specify a certain machine. -
Options -
Output -
The information in the output includes: -
Examples -
In the following example, an administrator using the admin - account gathers statistics from the Authentication Server running on the - machine fs1.abc.com. -
% kas statistics -servers fs1.abc.com - 56 allocs, 46 frees, 0 password changes - Hash table utilization = 0.100000% - From host bfff21a7 started at Tue Mar 23 12:42:02 1999: - of 88 requests for Authenticate, 18 were aborted. - of 14 requests for GetTicket, 0 were aborted. - of 4 requests for CreateUser, 1 were aborted. - of 12 requests for SetFields, 4 were aborted. - of 3 requests for DeleteUser, 0 were aborted. - of 23 requests for GetEntry, 4 were aborted. - of 18 requests for ListEntry, 0 were aborted. - of 2 requests for GetStats, 1 were aborted. - of 2 requests for GetRandomKey, 0 were aborted. - Used 6.015 seconds of CPU time. - 3 admin accounts - --
Privilege Required -
The issuer must have the ADMIN flag set on his or her - Authentication Database entry. -
Related Information -
kas -
-
- -
-
-
Purpose -
Converts a character string into an octal key -
Synopsis -
kas stringtokey -string <password string> [-cell <cell name>] [-help] - - kas str -s <password string> [-c <cell name>] [-h] --
Description -
The kas stringtokey command converts the character string - specified with the -string argument into an octal string suitable - for use as an encryption key. -
The kas command interpreter generates the octal key by using an - encryption algorithm on the combination of the specified string and the name - of the local cell (as recorded in the local /usr/vice/etc/ThisCell - file). Use the -cell argument to convert a string into a key - appropriate for a cell other than the local one. -
Cautions -
This command writes the key to the standard output stream, on which it can - possibly be intercepted by third parties. It is not very secure to use - the key in an actual Authentication Database entry. -
Options -
Output -
The output is of the following form: -
Converting password string in realm 'cell_name' yields key='key'. - --
Examples -
The following example shows the octal key equivalent of the string - new_pswd in the ABC Corporation cell. -
% kas stringtokey new_pswd - Converting new_pswd in realm 'ABC.COM' yields - key='\346\307\364\320\263\233\342\354'. - --
Privilege Required -
None, and no password is required. -
Related Information -
kas -
-
- -
-
-
Purpose -
Unlocks a locked user account -
Synopsis -
kas unlock -name <authentication ID> - [-admin_username <admin principal to use for authentication>] - [-password_for_admin <admin password>] [-cell <cell name>] - [-servers <explicit list of authentication servers>+] - [-noauth] [-help] - - kas u -na <authentication ID> - [-a <admin principal to use for authentication>] - [-p <admin password>] [-c <cell name>] - [-s <explicit list of authentication servers>+] [-no] [-h] --
Description -
The kas unlock command unlocks the Authentication Database entry - named by the -name argument. An entry becomes locked when - the user exceeds the limit on failed authentication attempts, generally by - providing the wrong password to either an AFS-modified login utility or the - klog command. Use the kas setfields command to - set the limit and the lockout time, and the kas examine command to - examine the settings. -
To unlock all locked user accounts at once, shutdown the - kaserver process on every database server machine, and remove the - /usr/afs/local/kaauxdb file from each one. The - kaserver process recreates the file as it restarts. -
Options -
Examples -
In the following example, an administrator using the admin - account unlocks the entry for jones: -
% kas unlock -name jones -admin_username admin - Administrator's (admin) Password: - --
Privilege Required -
The issuer must have the ADMIN flag set on his or her - Authentication Database entry. -
Related Information -
kas -
klog -
-
- -
-
-
Purpose -
Initializes the Authentication Server -
Description -
kaserver [-noAuth] [-fastKeys] [-database <dbpath>] - [-localfiles <lclpath>] [-minhours <n>] - [-servers <serverlist>] [-enable_peer_stats] - [-enable_process_stats] [-help] --
This command does not use the syntax conventions of the AFS command - suites. Provide the command name and all option names in full. -
Description -
The kaserver command initializes the Authentication Server, - which runs on every database server machine. In the conventional - configuration, its binary file is located in the /usr/afs/bin - directory on a file server machine. -
The kaserver command is not normally issued at the command shell - prompt but rather placed into a file server machine's - /usr/afs/local/BosConfig file with the bos create - command. If it is ever issued at the command shell prompt, the issuer - must be logged onto a database server machine as the local superuser - root. -
As it initializes, the Authentication Server process creates the two files - that constitute the Authentication Database, kaserver.DB0 - and kaserver.DBSYS1, in the /usr/afs/db directory - if they do not already exist. Use the commands in the kas - suite to administer the database. -
The Authentication Server is responsible for several aspects of AFS - security, including: -
The Authentication Server records a trace of its activity in the - /usr/afs/logs/AuthLog file. Use the bos getlog - command to display the contents of the file. Use the kdb - command to read the protected files associated with the AuthLog - file, AuthLog.dir and AuthLog.pag. -
Options -
Provide the -localfiles argument along with this one; - otherwise, the -localfiles argument is also set to the value of - this argument, which is probably inappropriate. -
Examples -
The following bos create command creates a kaserver - process on fs3.abc.com (the command appears on two - lines here only for legibility): -
% bos create -server fs3.abc.com -instance kaserver \ - -type simple -cmd /usr/afs/bin/kaserver --
Privilege Required -
The issuer must be logged in as the superuser root on a file - server machine to issue the command at a command shell prompt. It is - conventional instead to create and start the process by issuing the bos - create command. -
Related Information -
AuthLog -
kaserver.DB0 and kaserver.DBSYS1 -
bos -
kas -
kdb -
-
- -
-
-
Purpose -
Displays log or privileged actions performed by the Authentication Server -
Synopsis -
kdb [-dbmfile <dbmfile to use (default /usr/afs/logs/AuthLog)>] - [-key <extract entries that match specified key>] [-help] - --
Description -
The kdb command displays the contents of the - AuthLog.dir and AuthLog.pag files - associated with the AuthLog file that resides on the local disk, by - default in the /usr/afs/logs directory. The files must exist - in that directory, which normally implies that the Authentication Server is - running on the machine. The files contain information on privileged - actions performed by the Authentication Server. -
Cautions -
It is possible that on some operating systems that AFS otherwise supports, - the Authentication Server cannot create the - /usr/afs/logs/AuthLog.dir and - /usr/afs/logs/AuthLog.pag files, making this command - inoperative. See the IBM AFS Release Notes for - details. -
Options -
Output -
The first line of output indicates the location of the files from which the - subsequent information is derived: -
Printing all entries found in file_location --
Each entry then includes the following two fields, separated by a - colon: -
The final line of output sums the number of entries. -
Examples -
The following example shows the output of the kdb command in the - ABC Corporation cell (abc.com): -
% kdb - Printing all entries found in /usr/afs/logs/AuthLog - admin,krbtgt.ABC.COM:auth - admin,afs:gtck - admin:cruser - admin:delu - 4 entries were found - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
kaserver -
-
- -
-
-
Purpose -
Authenticates with the Authentication Server -
Synopsis -
klog [-x] [-principal <user name>] [-password <user's password>] - [-cell <cell name>] [-servers <explicit list of servers>+] - [-pipe] [-silent] [-lifetime <ticket lifetime in hh[:mm[:ss]]>] - [-setpag] [-tmp] [-help] - - klog [-x] [-pr <user name>] [-pa <user's password>] [-c <cell name>] - [-s <explicit list of servers>+] [-pi] [-si] - [-l <ticket lifetime in hh[:mm[:ss]]>] [-se] [-t] [-h] --
Description -
The klog command obtains an AFS token from the Authentication - Server. The Cache Manager on the local machine stores the token in a - credential structure in kernel memory and uses it when obtaining authenticated - access to the AFS filespace. This command does not affect the - issuer's identity (UNIX UID) in the local file system. -
By default, the command interpreter obtains a token for the AFS user name - that matches the issuer's identity in the local file system. To - specify an alternate user, include the -principal argument. - The user named by the -principal argument does not have to appear - in the local password file (the /etc/passwd file or - equivalent). -
By default, the command interpreter obtains a token for the local cell, as - defined by the AFSCELL environment variable set in the command shell or by the - /usr/vice/etc/ThisCell file on the local machine. To specify - an alternate cell, include the -cell argument. The command - interpreter contacts an Authentication Server chosen at random from the - cell's entry in the local /usr/afs/etc/CellServDB file, unless - the -servers argument is used to name one or more database server - machines. -
A user can have tokens in multiple cells simultaneously, but only one token - per cell per connection to the client machine. If the user's - credential structure already contains a token for the requested cell, the - token resulting from this command replaces it. -
Sites that employ standard Kerberos authentication instead of the AFS - Authentication Server must use the Kerberos version of this command, - klog.krb, on all client machines. It automatically - places the issuer's Kerberos tickets in the file named by the KRBTKFILE - environment variable, which the pagsh.krb command defines - automatically as /tmp/tktpX where X is the - number of the user's PAG. -
The lifetime of the token resulting from this command is the smallest of - the following. -
The output from the kas examine command displays an - Authentication Database entry's maximum ticket lifetime as Max - ticket lifetime. Administrators can display any entry, and users - can display their own entries. -
If none of the defaults have been changed, the token lifetime is 25 hours - for user accounts created by an Authentication Server running AFS 3.1 - or higher. The maximum lifetime for any token is 720 hours (30 days), - and the minimum is 5 minutes. -
Between the minimum and maximum values, the Authentication Server uses a - defined set of values, according to the following rules. Requested - lifetimes between 5 minutes and 10 hours 40 minutes are granted at 5 minute - intervals, rounding up. For example, if the issuer requests a lifetime - of 12 minutes, the token's actual lifetime is 15 minutes. -
For token lifetimes greater than 10 hours 40 minutes, consult the following - table, which presents all the possible times in units of - hours:minutes:seconds. - The number in parentheses is an approximation of the corresponding time in - days and hours (as indicated by the d and h - letters). For example, 282:22:17 means 282 - hours, 22 minutes, and 17 seconds, which translates to approximately 11 days - and 18 hours (11d 18h). The Authentication Server rounds up - a requested lifetime to the next highest possible lifetime. -
11:24:15 (0d 11h) 46:26:01 (1d 22h) 189:03:38 (7d 21h) - 12:11:34 (0d 12h) 49:38:40 (2d 01h) 202:08:00 (8d 10h) - 13:02:09 (0d 13h) 53:04:37 (2d 05h) 216:06:35 (9d 00h) - 13:56:14 (0d 13h) 56:44:49 (2d 08h) 231:03:09 (9d 15h) - 14:54:03 (0d 14h) 60:40:15 (2d 12h) 247:01:43 (10d 07h) - 15:55:52 (0d 15h) 64:51:57 (2d 16h) 264:06:34 (11d 00h) - 17:01:58 (0d 17h) 69:21:04 (2d 21h) 282:22:17 (11d 18h) - 18:12:38 (0d 18h) 74:08:46 (3d 02h) 301:53:45 (12d 13h) - 19:28:11 (0d 19h) 79:16:23 (3d 07h) 322:46:13 (13d 10h) - 20:48:57 (0d 20h) 84:45:16 (3d 12h) 345:05:18 (14d 09h) - 22:15:19 (0d 22h) 90:36:53 (3d 18h) 368:56:58 (15d 08h) - 23:47:38 (0d 23h) 96:52:49 (4d 00h) 394:27:37 (16d 10h) - 25:26:21 (1d 01h) 103:34:45 (4d 07h) 421:44:07 (17d 13h) - 27:11:54 (1d 03h) 110:44:28 (4d 14h) 450:53:46 (18d 18h) - 29:04:44 (1d 05h) 118:23:54 (4d 22h) 482:04:24 (20d 02h) - 31:05:22 (1d 07h) 126:35:05 (5d 06h) 515:24:22 (21d 11h) - 33:14:21 (1d 09h) 135:20:15 (5d 15h) 551:02:38 (22d 23h) - 35:32:15 (1d 11h) 144:41:44 (6d 00h) 589:08:45 (24d 13h) - 37:59:41 (1d 13h) 154:42:01 (6d 10h) 629:52:56 (26d 05h) - 40:37:19 (1d 16h) 165:23:50 (6d 21h) 673:26:07 (28d 01h) - 43:25:50 (1d 19h) 176:50:01 (7d 08h) - --
Cautions -
By default, this command does not create a new process authentication group - (PAG); see the description of the pagsh command to learn about - PAGs. If a cell does not use an AFS-modified login utility, users must - include -setpag option to this command, or issue the - pagsh command before this one, to have their tokens stored in a - credential structure that is identified by PAG rather than by local - UID. -
When a credential structure is identified by local UID, the potential - security exposure is that the local superuser root can use the UNIX - su command to assume any other identity and automatically inherit - the tokens associated with that UID. Identifying the credential - structure by PAG eliminates this exposure. -
If the -password argument is used, the specified password cannot - begin with a hyphen, because it is interpreted as another option name. - Use of the -password argument is not recommended in any - case. -
By default, it is possible to issue this command on a properly configured - NFS client machine that is accessing AFS via the NFS/AFS Translator, assuming - that the NFS client machine is a supported system type. However, if the - translator machine's administrator has enabled UID checking by including - the -uidcheck on argument to the fs exportafs command, - the command fails with an error message similar to the following: -
- Warning: Remote pioctl to translator_machine has failed (err=8). . . - Unable to authenticate to AFS because a pioctl failed. --
Enabling UID checking means that the credential structure in which tokens - are stored on the translator machine must be identified by a UID that matches - the local UID of the process that is placing the tokens in the credential - structure. After the klog command interpreter obtains the - token on the NFS client, it passes it to the remote executor daemon on the - translator machine, which makes the system call that stores the token in a - credential structure on the translator machine. The remote executor - generally runs as the local superuser root, so in most cases its - local UID (normally zero) does not match the local UID of the user who issued - the klog command on the NFS client machine. -
Issuing the klog command on an NFS client machine creates a - security exposure: the command interpreter passes the token across the - network to the remote executor daemon in clear text mode. -
Options -
If this argument is omitted, the command is executed in the local cell, as - defined -
If this argument is omitted, the command interpreter establishes a - connection with each machine listed for the indicated cell in the local copy - of the /usr/vice/etc/CellServDB file, and then chooses one of them - at random for command execution. -
Cautions -
Output -
The following message indicates that the limit on consecutive - authentication failures has been exceeded. An administrator can use the - kas unlock command to unlock the account, or the issuer can wait - until the lockout time for the account has passed. (The time is set - with the -locktime argument to the kas setfields command - and displayed in the output from the kas examine command). -
- Unable to authenticate to AFS because ID is locked - see your system admin - --
If the -tmp flag is included, the following message confirms - that a Kerberos-style ticket file was created: -
- Wrote ticket file to /tmp - --
Examples -
Most often, this command is issued without arguments. The - appropriate password is for the person currently logged into the local file - system. The ticket's lifetime is calculated as described in the - Description section (if no defaults have been changed, it is 25 - hours for a user whose Authentication Database entry was created in AFS - 3.1 or later). -
- % klog - Password: - --
The following example authenticates the user as admin in the ABC - Corporation's test cell: -
- % klog -principal admin -cell test.abc.com - Password: - --
In the following, the issuer requests a ticket lifetime of 104 hours 30 - minutes (4 days 8 hours 30 minutes). Presuming that this lifetime is - allowed by the maximum ticket lifetimes and other factors described in the - Description section, the token's lifetime is - 110:44:28, which is the next largest possible value. -
% klog -lifetime 104:30 - Password: - --
Privilege Required -
None -
Related Information -
kaserver -
pagsh -
tokens -
-
- -
-
-
Purpose -
Establishes basis for authenticated access to AFS from a non-supported NFS - client using the NFS/AFS Translator -
Synopsis -
knfs -host <host name> [-id <user ID (decimal)>] - [-sysname <host's '@sys' value>] [-unlog] [-tokens] [-help] - - knfs -ho <host name> [-i <user ID (decimal)>] - [-s <host's '@sys' value>] [-u] [-t] [-he] --
Description -
The knfs command creates an AFS credential structure on the - local machine, identifying it by a process authentication group (PAG) number - associated with the NFS client machine named by the -hostname - argument and by default with a local UID on the NFS client machine that - matches the issuer's local UID on the local machine. It places in - the credential structure the AFS tokens that the issuer has previously - obtained (by logging onto the local machine if an AFS-modified login utility - is installed, by issuing the klog command, or both). To - associate the credential structure with an NFS UID that does not match the - issuer's local UID, use the -id argument. -
Issue this command only on the NFS(R)/AFS translator machine that is - serving the NFS client machine, after obtaining AFS tokens on the translator - machine for every cell to which authenticated access is required. The - Cache Manager on the translator machine uses the tokens to obtain - authenticated AFS access for the designated user working on the NFS client - machine. This command is not effective if issued on an NFS client - machine. -
To enable the user on the NFS client machine to issue AFS commands, use the - -sysname argument to specify the NFS client machine's system - type, which can differ from the translator machine's. The NFS - client machine must be a system type for which AFS is supported. -
The -unlog flag discards the tokens in the credential structure, - but does not destroy the credential structure itself. The Cache Manager - on the translator machine retains the credential structure until the next - reboot, and uses it each time the issuer accesses AFS through the translator - machine. The credential structure only has tokens in it if the user - reissues the knfs command on the translator machine each time the - user logs into the NFS client machine. -
To display the tokens associated with the designated user on the NFS client - machine, include the -tokens flag. -
Users working on NFS client machines of system types for which AFS binaries - are available (and for which the cell has purchased a license) can use the - klog command rather than the knfs command. -
Cautions -
If the translator machine's administrator has enabled UID checking by - issuing the fs exportafs command with the -uidcheck on - argument, it is not possible to use the -id argument to assign the - tokens to an NFS UID that differs from the issuer's local UID. In - this case, there is no point in including the -id argument, because - the only acceptable value (the issuer's local UID) is the value used when - the -id argument is omitted. Requiring matching UIDs is - effective only when users have the same local UID on the translator machine as - on NFS client machines. In that case, it guarantees that users assign - their tokens only to their own NFS sessions. -
This command does not make it possible for users working on non-supported - system types to issue AFS commands. This is possible only on NFS - clients of a system type for which AFS is available. -
Options -
Output -
The following error message indicates that UID checking is enabled on the - translator machine and that the value provided for the -id argument - differs from the issuer's local UID. -
- knfs: Translator in 'passwd sync' mode; remote uid must be the same as local uid --
Examples -
The following example illustrates a typical use of this command. The - issuer smith is working on the machine - nfscli1.abc.com and has user ID 1020 on - that machine. The translator machine - tx4.abc.com uses an AFS-modified login utility, so - smith obtains tokens for the ABC Corporation cell automatically - upon login via the telnet program. She then issues the - klog command to obtain tokens as admin in the ABC - Corporation's test cell, test.abc.com, and the - knfs command to associate both tokens with the credential structure - identified by machine name nfs-cli1 and user ID - 1020. She breaks the connection to tx4 and works - on nfscli1. -
% telnet tx4.abc.com - . . . - login: smith - Password: - AFS(R) login - - % klog admin -cell test.abc.com - Password: - - % knfs nfscli1.abc.com 1020 - - % exit - --
The following example shows user smith again connecting to the - machine tx4 via the telnet program and discarding the - tokens. -
% telnet translator4.abc.com - . . . - login: smith - Password: - AFS(R) login - - % knfs nfscli1.abc.com 1020 -unlog - - % exit --
Privilege Required -
None -
Related Information -
klog -
pagsh -
-
- -
-
-
Purpose -
Changes the issuer's password in the Authentication Database -
Synopsis -
kpasswd [-x] [-principal <user name>] [-password <user's password>] - [-newpassword <user's new password>] [-cell <cell name>] - [-servers <explicit list of servers>+] [-pipe] [-help] - - kpasswd [-x] [-pr <user name>] [-pa <user's password>] - [-n <user's new password>] [-c <cell name>] - [-s <explicit list of servers>+] [-pi] [-h] --
Description -
The kpasswd command changes the password recorded in an - Authentication Database entry. By default, the command interpreter - changes the password for the AFS user name that matches the issuer's - local identity (UNIX UID). To specify an alternate user, include the - -principal argument. The user named by the - -principal argument does not have to appear in the local password - file (the /etc/passwd file or equivalent). -
By default, the command interpreter sends the password change request to - the Authentication Server running on one of the database server machines - listed for the local cell in the /usr/afs/etc/CellServDB file on - the local disk; it chooses the machine at random. It consults the - /usr/vice/etc/ThisCell file on the local disk to learn the local - cell name. To specify an alternate cell, include the -cell - argument. -
Unlike the UNIX passwd command, the kpasswd command - does not restrict passwords to eight characters or less; it accepts - passwords of virtually any length. All AFS commands that require - passwords (including the klog, kpasswd, and AFS-modified - login utilities, and the commands in the kas suite) accept - passwords longer than eight characters, but some other applications and - operating system utilities do not. Selecting an AFS password of eight - characters or less enables the user to maintain matching AFS and UNIX - passwords. -
The command interpreter makes the following checks: -
Password was not changed because it seems like a reused password - --
To prevent a user from subverting this restriction by changing the password - twenty times in quick succession (manually or by running a script), use the - -minhours argument on the kaserver initialization - command. The following error message appears if a user attempts to - change a password before the minimum time has passed: -
Password was not changed because you changed it too - recently; see your systems administrator --
Options -
Old password: current_password - --
Omit this argument to have the command interpreter prompt for the password, - which does not echo visibly: -
New password (RETURN to abort): new_password - Retype new password: new_password - --
By default, the command is executed in the local cell, as defined -
Examples -
The following example shows user pat changing her password in - the ABC Corporation cell. -
% kpasswd - Changing password for 'pat' in cell 'abc.com'. - Old password: - New password (RETURN to abort): - Verifying, please re-enter new_password: - --
Privilege Required -
None -
Related Information -
klog -
kpwvalid -
-
- -
-
-
Purpose -
Checks quality of new password -
Description -
The kpwvalid command checks the quality of a new password passed - to it from the kpasswd or kas setpassword - command. It is optional. If it exists, it must reside in the - same AFS directory as the binaries for the kpasswd and - kas command suites (create a symbolic link from the client - machine's local disk to this directory). The directory's ACL - must extend the a (administer) and w - (write) permissions to the system:administrators - group only. These requirements prevent unauthorized users from - substituting a spurious kpwvalid binary. -
The AFS distribution includes an example kpwvalid program that - checks that the password is at least eight characters long; the code for - it appears in the following Examples section. -
The script or program must accept a sequence of password strings, one per - line, on the standard input stream. The first is the current password - and is ignored. Each subsequent string is a candidate password to be - checked. The program must write the following to the standard output - stream for each one: -
Further, it must write any error messages only to the standard error - stream, not to the standard output stream. -
Examples -
The following example program, included in the AFS distribution, verifies - that the requested password includes eight or more characters. -
#include <stdio.h> - /* prints 0 if the password is long enough, otherwise non-zero */ - main() - { - char oldpassword[512]; - char password[512]; - - if (fgets(oldpassword, 512, stdin)) - while (fgets(password, 512, stdin)) { - if (strlen(password) > 8) { /* password includes a newline */ - fputs("0\n",stdout); - fflush(stdout); - } - else { - fputs("Passwords must contain at least 8 characters.\n", - stderr); - fputs("1\n",stdout); - fflush(stdout); - } - return 0; - } - --
Related Information -
kpasswd -
-
- -
-
-
Purpose -
Configures files and directories on the local disk -
Synopsis -
package [initcmd] [-config <base name of configuration file>] - [-fullconfig <full name of configuration file, or stdin for standard input>] - [-overwrite] [-noaction] [-verbose] [-silent] [-rebootfiles] - [-debug] [-help] - - package [i] [-c <base name of configuration file>] - [-f <full name of configuration file, or stdin for standard input>] - [-o] [-n] [-v] [-s] [-r] [-d] [-h] --
Description -
The package command configures the machine's local disk to - comply with the instructions in the configuration file named by the - -config or -fullconfig argument. -
By default, the package command alters any existing local disk - element whose contents or configuration does not match the element defined in - the configuration file. For example, if a configuration file - D instruction defines a directory that has the same name as a - symbolic link on the local disk, the package command replaces the - symbolic link with the directory. The F and L - instructions include an optional update_code field that alters this - behavior. -
Also by default, the package command takes no action on elements - on the local disk that are not mentioned in the configuration file. Use - the D instruction's R update code to remove files - from the disk directory that are not mentioned in the configuration - file. -
Before running the package command, the administrator must - create the template file and other files on the local disk. For - instructions, see the IBM AFS Administration Guide. -
It is not possible to configure a remote client machine's disk using - this command. -
Cautions -
The package command interpreter exits without executing any - instruction if there are any syntax errors or incorrect values in the - configuration file. -
Options -
Provide this argument or the -fullconfig argument. -
Provide this argument or the -config argument. -
Examples -
This command is usually invoked in a client machine's AFS - initialization file (/etc/rc or equivalent), rather than issued at - the command shell prompt. -
The following command invokes the version of the staff - configuration file appropriate for this machine's system type, and - produces verbose output. -
# /etc/package -c staff -v - --
The following example uses the configuration file whose basename is defined - in the /.package file on the local machine. This - method enables the administrator to use the same package command in - every machine's AFS initialization file but still customize configuration - by putting the appropriate basename in the /.package - file. -
# /etc/package -c `cat /.package` -v - --
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
-
- -
-
-
Purpose -
Displays each help entry containing a keyword string -
Synopsis -
package apropos [-topic <help string>] [-help] - - package a [-t <help string>] [-h] --
Description -
The package apropos command displays the first line of the - online help entry for any package command that has in its name or - short description the string specified by the -topic - argument. -
To display the syntax for a command, use the package help - command. -
Options -
Output -
The first line of a command's online help entry names it and briefly - describes its function. This command displays the first line for any - package command where the string specified with the - -topic argument is part of the command name or first line. -
Examples -
The following command lists all package commands that include - the word help in their names or short descriptions: -
% package apropos help - apropos: search by help text - help: get help on commands - --
Privilege Required -
None -
Related Information -
package -
-
- -
-
-
Purpose -
Displays the syntax of specified package commands or lists - functional descriptions of all package commands -
Synopsis -
package help [-topic <help string>+] [-help] - - package h [-t <help string>+] [-h] --
Description -
The package help command displays the complete online help entry - (short description and syntax statement) for each command operation code - specified by the -topic argument. If the -topic - argument is omitted, the output includes the first line (name and short - description) of the online help entry for every package - command. -
To list every package command whose name or short description - includes a specified keyword, use the package apropos - command. -
Options -
Output -
The online help entry for each package command consists of the - following two or three lines: -
Examples -
The following command displays the online help entry for the package - initcmd command: -
% package help initcmd - package initcmd: initialize the program - Usage: package [initcmd] [-config <base name of configuration file>] - [-fullconfig <full name of configuration file, or stdin for standard input>] - [-overwrite] [-noaction] [-verbose] [-silent] [-rebootfiles] - [-debug] [-help] - --
Privilege Required -
None -
Related Information -
package -
-
- -
-
-
Purpose -
Tests the validity of a package configuration file -
Synopsis -
package_test <config file> --
This command does not use the syntax conventions of the AFS command - suites. Provide the command name in full. -
Description -
The package_test command tests the validity of a - package configuration file created when a prototype file is - compiled. The command interpreter prints error messages on the standard - output stream. -
Options -
Examples -
The following example tests the validity of the package - configuration file staff.sun4x_56. -
% package_test staff.sun4x_56 - --
Privilege Required -
None -
Related Information -
package -
-
- -
-
-
Purpose -
Creates a new PAG -
Synopsis -
pagsh --
Description -
The pagsh command creates a new command shell (owned by the - issuer of the command) and associates a new process authentication - group (PAG) with the shell and the user. A PAG is a number - guaranteed to identify the issuer of commands in the new shell uniquely to the - local Cache Manager. The PAG is used, instead of the issuer's UNIX - UID, to identify the issuer in the credential structure that the Cache Manager - creates to track each user. -
Any tokens acquired subsequently (presumably for other cells) become - associated with the PAG, rather than with the user's UNIX UID. - This method for distinguishing users has two advantages. -
Note: | The pagsh.krb version of this command is intended for use - by sites that employ standard Kerberos authentication for their - clients. The pagsh.krb command provides all the - functionality of the pagsh command. In addition, it defines - the environment variable KRBTKFILE (which specifies the storage location of - Kerberos tickets) to be the /tmp/tktpX file (where - X is the number of the user's PAG). The functionality of - this command supports the placement of Kerberos tickets by the - klog.krb command and Kerberized AFS-modified login utilities - in the file specified by the environment variable KRBTKFILE. - |
Cautions -
Each PAG created uses two of the memory slots that the kernel uses to - record the UNIX groups associated with a user. If none of these slots - are available, the pagsh command fails. This is not a - problem with most operating systems, which make at least 16 slots available - per user. -
In cells that do not use an AFS-modified login utility, use this command to - obtain a PAG before issuing the klog command (or include the - -setpag argument to the klog command). If a PAG - is not acquired, the Cache Manager stores the token in a credential structure - identified by local UID rather than PAG. This creates the potential - security exposure described in the Description section. -
If users of NFS client machines for which AFS is supported are to issue - this command as part of authenticating with AFS, do not use the fs - exportafs command's -uidcheck on argument to enable UID - checking on NFS/AFS Translator machines. Enabling UID checking prevents - this command from succeeding. See the reference page for the - klog command. -
If UID checking is not enabled on Translator machines, then by default it - is possible to issue this command on a properly configured NFS client machine - that is accessing AFS via the NFS/AFS Translator, assuming that the NFS client - machine is a supported system type. The pagsh binary - accessed by the NFS client must be owned by, and grant setuid privilege to, - the local superuser root. The complete set of mode bits must - be -rwsr-xr-x. This is not a requirement when the command is - issued on AFS client machines. -
However, if the translator machine's administrator has enabled UID - checking by including the -uidcheck on argument to the fs - exportafs command, the command fails with an error message similar to - the following: -
- Warning: Remote setpag to translator_machine has failed (err=8). . . - setpag: Exec format error --
Examples -
In the following example, the issuer invokes the C shell instead of the - default Bourne shell: -
# pagsh -c /bin/csh - --
Privilege Required -
None -
Related Information -
klog -
tokens -
-
- -
-
-
Purpose -
Checks the integrity of the Protection Database -
Synopsis -
prdb_check -database <ptdb_file> [-uheader] [-pheader] [-entries] - [-verbose] [-help] - - prdb_check -d <ptdb_file> [-u] [-p] [-e] [-v] [-h] --
Description -
The prdb_check command checks the integrity of the Protection - Database, reporting any errors or corruption it finds. If there are - problems, do not issue any pts commands until the database is - repaired. -
Cautions -
The results can be unpredictable if the Protection Server makes changes to - the Protection Database while this command is running. Use the bos - shutdown command to shutdown the local ptserver process - before running this command, or before creating a second copy of the - prdb.DB0 file (with a different name) on which to run the - command. -
Options -
Output -
If there are errors in the database, the output always reports them on the - standard error stream. If any options other than -database - or -help are provided, the output written to the standard output - stream includes additional information as described for each option in the - preceding Options section of this reference page. The output - is intended for debugging purposes and is meaningful to someone familiar with - the internal structure of the Protection Database. -
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
ptserver -
-
- -
-
-
Purpose -
Introduction to the pts command suite -
Description -
The commands in the pts command suite are the administrative - interface to the Protection Server, which runs on each database server machine - in a cell and maintains the Protection Database. The database stores - the information that AFS uses to augment and refine the standard UNIX scheme - for controlling access to files and directories. -
Instead of relying only on the mode bits that define access rights for - individual files, AFS associates an access control list (ACL) with each - directory. The ACL lists users and groups and specifies which of seven - possible access permissions they have for the directory and the files it - contains. (It is still possible to set a directory or file's mode - bits, but AFS interprets them in its own way; see the chapter on - protection in the IBM AFS Administration Guide for details.) -
AFS enables users to define groups in the Protection Database and place - them on ACLs to extend a set of rights to multiple users - simultaneously. Groups simplify administration by making it possible to - add someone to many ACLs by adding them to a group that already exists on - those ACLs. Machines can also be members of a group, so that users - logged into the machine automatically inherit the permissions granted to the - group. -
There are several categories of commands in the pts command - suite: -
pts listowned, pts membership, and pts - removeuser -
Options -
The following arguments and flags are available on many commands in the - pts suite. The reference page for each command also lists - them, but they are described here in greater detail. -
Privilege Required -
Members of the system:administrators group can issue all - pts commands on any entry in the Protection Database. -
Users who do not belong to the system:administrators group - can list information about their own entry and any group entries they - own. The privacy flags set with the pts setfields command - control access to entries owned by other users. -
Related Information -
pts help -
-
- -
-
-
Purpose -
Adds a user or machine to a Protection Database group -
Synopsis -
pts adduser -user <user name>+ -group <group name>+ - [-cell <cell name>] [-noauth] [-force] [-help] - - pts ad -u <user name>+ -g <group name>+ [-c <cell name>] [-n] [-f] [-h] --
Description -
The pts adduser command adds each user or machine entry named by - the -user argument as a member of each group named by the - -group argument. -
To remove members of a group, use the pts removeuser - command. To list the groups to which a user or machine belongs, or the - members of a specified group, use the pts membership - command. -
Cautions -
After being added as a group member, a currently authenticated user must - reauthenticate (for example, by issuing the klog command) to obtain - permissions granted to the group on an access control list (ACL). -
Options -
Examples -
The following example adds user smith to the group - system:administrators. -
% pts adduser -user smith -group system:administrators - --
The following example adds users jones, terry, and - pat to the smith:colleagues group. -
% pts adduser -user jones terry pat -group smith:colleagues - --
The following example adds the machine entries in the ABC Corporation - subnet to the group bin-prot. Because of the IP address - range of the ABC Corporation subnet, the system administrator was able to - group the machines into three machine entries (using the wildcard notation - discussed on the pts createuser reference page). -
% pts adduser -user 138.255.0.0 192.12.105.0 192.12.106.0 -group bin-prot - --
Privilege Required -
The required privilege depends on the setting of the fourth privacy flag in - the Protection Database entry for each group named by the -group - argument (use the pts examine command to display the flags): -
Related Information -
pts -
-
- -
-
-
Purpose -
Displays each help entry containing a keyword string -
Synopsis -
pts apropos -topic <help string> [-help] - - pts ap -t <help string> [-h] --
Description -
The pts apropos command displays the first line of the online - help entry for any pts command that has in its name or short - description the string specified by the -topic argument. -
To display the syntax for a command, use the pts help - command. -
Options -
Output -
The first line of a command's online help entry names it and briefly - describes its function. This command displays the first line for any - pts command in which the string specified by the -topic - argument is part of the command name or first line. -
Examples -
The following command lists all pts commands that include the - word create in their names or short descriptions: -
% pts apropos create - creategroup: create a new group - createuser: create a new user - --
Privilege Required -
None -
Related Information -
pts -
pts help -
-
- -
-
-
Purpose -
Changes the owner of a Protection Database entry -
Synopsis -
pts chown -name <group name> -owner <new owner> - [-cell <cell name>] [-noauth] [-force] [-help] - - pts cho -na <group name> -o <new owner> [-c <cell name>] [-no] [-f] [-h] --
Description -
The pts chown command designates the user or group named by the - -owner argument as the owner of the group named by the - -name argument, and records the new owner in the owner field of the - group's Protection Database entry. -
In the case of regular groups, this command automatically changes the group - name's owner prefix (the part of the group name before the colon) to - match the new owner. If the new owner is itself a group, then only its - owner prefix, not its complete name, becomes the owner prefix in the new - name. The change to the owner prefix does not propagate to any groups - owned by the group, however. To make the owner prefix of such - group-owned groups reflect the new owning group, use the pts rename - command. -
It is not possible to change a user or machine entry's owner from the - default set at creation time, the system:administrators - group. -
Cautions -
While designating a machine as a group's owner does not cause an - error, it is not recommended. The Protection Server does not extend the - usual privileges of group ownership to users logged onto the machine. -
Options -
Examples -
The following example changes the owner of the group - terry:friends from the user terry to the user - pat. A side effect is that the group name changes to - pat:friends. -
% pts chown -name terry:friends -owner pat - --
The following example changes the owner of the group - terry:friends from the user terry to the group - pat:buddies. A side effect is that the group name - changes to pat:friends. -
% pts chown -name terry:friends -owner pat:buddies - --
Privilege Required -
The issuer must belong to the system:administrators group - or currently own the group. -
Related Information -
pts -
-
- -
-
-
Purpose -
Creates an (empty) Protection Database group entry -
Synopsis -
pts creategroup -name <group name>+ [-owner <owner of the group>] - [-id <id (negated) for the group>+] [-cell <cell name>] - [-noauth] [-force] [-help] - - pts createg -na <group name>+ [-o <owner of the group>] - [-i <id (negated) for the group>+] [-c <cell name>] - [-no] [-f] [-h] - - pts cg -na <group name>+ [-o <owner of the group>] - [-i <id (negated) for the group>+] - [-c <cell name>] [-no] [-f] [-h] --
Description -
The pts creategroup command creates an entry in the Protection - Database for each group specified by the -name argument. The - entry records the issuer of the command as the group's creator, and as - the group's owner unless the -owner argument names an - alternate user or group as the owner. -
There are two types of groups: -
Creating a group lowers the issuer's group-creation quota by - one. This is true even if the -owner argument is used to - assign ownership to an alternate user or group. To display a - user's group-creation quota, use the pts examine command; - to set it, use the pts setfields command. -
AFS group ID (AFS GID) numbers are negative integers and by default the - Protection Server assigns a GID that is one less (more negative) than the - current value of the max group id counter in the Protection - Database, decrementing the counter by one for each group. Members of - the system:administrators group can use the -id - argument to assign specific AFS GID numbers. If any of the specified - GIDs is lower (more negative) than the current value of the max group - id counter, the counter is reset to that value. It is acceptable - to specify a GID greater (less negative) than the current value of the - counter, but the creation operation fails if an existing group already has - it. To display or set the value of the max group id counter, - use the pts listmax or pts setmax command, - respectively. -
Output -
The command generates the following string to confirm creation of each - group: -
group name has id AFS GID - --
Cautions -
Although using the -owner argument to designate a machine entry - as a group's owner does not generate an error, it is not - recommended. The Protection Server does not extend the usual privileges - of group ownership to users logged onto the machine. -
Options -
A regular group's name must have the following format: -
owner_name:group_name - --
and the owner_name field must reflect the actual owner of the - group, as follows: -
If this argument is used and the -name argument names multiple - new groups, it is best to provide an equivalent number of AFS GIDs. The - first GID is assigned to the first group, the second to the second group, and - so on. If there are fewer GIDs than groups, the Protection Server - assigns GIDs to the unmatched groups based on the max group id - counter. If there are more GIDs than groups, the excess GIDs are - ignored. If any of the GIDs is lower (more negative) than the current - value of the max group id counter, the counter is reset to that - value. -
Examples -
In the following example, the user pat creates groups called - pat:friends and pat:colleagues. -
% pts creategroup -name pat:friends pat:colleagues - --
The following example shows a member of the - system:administrators group creating the prefix-less group - staff and assigning its ownership to the - system:administrators group rather than to herself. -
% pts creategroup -name staff -owner system:administrators - --
In the following example, the user pat creates a group called - smith:team-members, which is allowed because the - -owner argument specifies the required value - (smith). -
% pts creategroup -name smith:team-members -owner smith - --
Privilege Required -
The issuer must belong to the system:administrators group - to create prefix-less groups or include the -id argument. -
To create a regular group, the issuer must -
Related Information -
pts -
-
- -
-
-
Purpose -
Creates a user or machine entry in the Protection Database -
Synopsis -
pts createuser -name <user name>+ [-id <user id>+] [-cell <cell name>] - [-noauth] [-force] [-help] - - pts createu -na <user name>+ [-i <user id>+] [-c <cell name>] - [-no] [-f] [-h] - - pts cu -na <user name>+ [-i <user id>+] [-c <cell name>] [-no] [-f] [-h] --
Description -
The pts createuser command creates an entry in the Protection - Database for each user or machine specified by the -name - argument. A user entry name becomes the user's AFS username (the - one to provide when authenticating with the AFS Authentication Server). - A machine entry's name is the machine's IP address or a wildcard - notation that represents a range of consecutive IP addresses (a group of - machines on the same network). It is not possible to authenticate as a - machine, but a group to which a machine entry belongs can appear on a - directory's access control list (ACL), thereby granting the indicated - permissions to any user logged on to the machine. -
AFS user IDs (AFS UIDs) are positive integers and by default the Protection - Server assigns an AFS UID that is one greater than the current value of the - max user id counter in the Protection Database, incrementing the - counter by one for each user. To assign a specific AFS UID, use the - -id argument. If any of the specified AFS UIDs is greater - than the current value of the max user id counter, the counter is - reset to that value. It is acceptable to specify an AFS UID smaller - than the current value of the counter, but the creation operation fails if an - existing user or machine entry already has it. To display or set the - value of the max user id counter, use the pts listmax or - pts setmax command, respectively. -
The issuer of the pts createuser command is recorded as the - entry's creator and the group system:administrators as - its owner. -
Cautions -
The Protection Server reserves AFS UID 0 (zero) and returns an error if the - -id argument has that value. -
Options -
Do not define a machine entry with the name - 0.0.0.0 to match every machine. The - system:anyuser group is equivalent. -
If this argument is used and the -name argument names multiple - new entries, it is best to provide an equivalent number of AFS UIDs. - The first UID is assigned to the first entry, the second to the second entry, - and so on. If there are fewer UIDs than entries, the Protection Server - assigns UIDs to the unmatched entries based on the max user id - counter. If there are more UIDs than entries, the excess UIDs are - ignored. If any of the UIDs is greater than the current value of the - max user id counter, the counter is reset to that value. -
Output -
The command generates the following string to confirm creation of each - user: -
User name has id id - --
Examples -
The following example creates a Protection Database entry for the user - johnson. -
% pts createuser -name johnson - --
The following example creates three wildcarded machine entries in the ABC - Corporation cell. The three entries encompass all of the machines on - the company's networks without including machines on other - networks: -
% pts createuser -name 138.255.0.0 192.12.105.0 192.12.106.0 - --
Privilege Required -
The issuer must belong to the system:administrators - group. -
Related Information -
pts -
-
- -
-
-
Purpose -
Deletes a Protection Database entry -
Synopsis -
pts delete -nameorid <user or group name or id>+ [-cell <cell name>] - [-noauth] [-force] [-help] - - pts d -na <user or group name or id>+ [-c <cell name>] [-no] [-f] [-h] --
Description -
The pts delete command removes each entry specified by the - -nameorid argument from the Protection Database. Deleting - entries affects other parts of the system in various ways: -
To remove a user or machine from a group without actually deleting the - entry, use the pts removeuser command. -
Options -
Examples -
The following example deletes the user entries pat and - terry: -
% pts delete pat terry - --
The following example deletes the Protection Database entry of the group - with AFS GID -215. -
% pts delete -215 - --
Privilege Required -
The issuer must belong to the system:administrators group - to delete user and machine entries. To delete group entries, the issuer - must either own the group or belong to the - system:administrators group. -
Related Information -
pts -
-
- -
-
-
Purpose -
Displays a Protection Database entry -
Synopsis -
pts examine -nameorid <user or group name or id>+ [-cell <cell name>] - [-noauth] [-force] [-help] - - pts e -na <user or group name or id>+ [-c <cell name>] [-no] [-f] [-h] - - pts check -na <user or group name or id>+ [-c <cell name>] - [-no] [-f] [-h] - - pts che -na <user or group name or id>+ [-c <cell name>] - [-no] [-f] [-h] --
Description -
The pts examine command displays information from the Protection - Database entry of each user, machine or group specified by the - -nameorid argument. -
Options -
Output -
The output for each entry consists of two lines that include the following - fields: -
-
Each flag can take three possible types of values to enable a different set - of users to issue the corresponding command: -
-
For example, the flags SOmar on a group entry indicate that - anyone can examine the group's entry and display the groups that it owns, - and that only the group's members can display, add, or remove its - members. -
The default privacy flags for user and machine entries are - S----, meaning that anyone can display the entry. The - ability to perform any other functions is restricted to members of the - system:administrators group and the entry's owner (as - well as the user for a user entry). -
The default privacy flags for group entries are S-M--, meaning - that all users can display the entry and the members of the group, but only - the entry owner and members of the system:administrators - group can perform other functions. -
Examples -
The following example displays the user entry for terry and the - machine entry 158.12.105.44. -
% pts examine terry 158.12.105.44 - Name: terry, id: 1045, owner: system:administrators, creator: admin, - membership: 9, flags: S----, group quota: 15. - Name: 158.12.105.44, id: 5151, owner: system:administrators, - creator: byu, membership: 1, flags: S----, group quota: 20. - --
The following example displays the entries for the AFS groups with GIDs - -673 and -674. -
% pts examine -673 -674 - Name: terry:friends, id: -673, owner: terry, creator: terry, - membership: 5, flags: S-M--, group quota: 0. - Name: smith:colleagues, id: -674, owner: smith, creator: smith, - membership: 14, flags: SOM--, group quota: 0. - --
Privilege Required -
The required privilege depends on the setting of the first privacy flag in - the Protection Database entry of each entry specified by the - -nameorid argument: -
Related Information -
pts -
-
- -
-
-
Purpose -
Displays the syntax of specified pts commands or lists - functional descriptions for all pts commands -
Synopsis -
pts help [-topic <help string>+] [-help] - - pts h [-t <help string>+] [-h] --
Description -
The pts help command displays the complete online help entry - (short description and syntax statement) for each command operation code - specified by the -topic argument. If the -topic - argument is omitted, the output includes the first line (name and short - description) of the online help entry for every pts command. -
To list every pts command whose name or short description - includes a specified keyword, use the pts apropos command. -
Options -
Output -
The online help entry for each pts command consists of the - following two or three lines: -
Examples -
The following command displays the online help entry for the pts - membership command: -
% pts help membership - pts membership: list membership of a user or group - aliases: groups - Usage: pts membership -nameorid <user or group name or id>+ - [-cell <cell name>] [-noauth] [-force] [-help] - --
Privilege Required -
None -
Related Information -
pts -
-
- -
-
-
Purpose -
Displays all user or group entries in the Protection Database -
Synopsis -
pts listentries [-users] [-groups] [-cell <cell name>] - [-noauth] [-force] [-help] - - pts liste [-u] [-g] [-c <cell name>] [-n] [-f] [-h] --
Description -
The pts listentries command displays the name and AFS ID of all - Protection Database entries of the indicated type. It also displays the - AFS ID of each entry's owner and creator. -
To display all user and machine entries, either include the - -users flag or omit both it and the -groups flag. - To display all group entries, include the -groups flag. To - display all entries, provide both flags. -
Options -
Output -
The output includes a line for each entry, with information in four columns - that have the following headers: -
In general, the entries appear in the order in which they were - created. -
Examples -
The following example displays both user and group entries. -
% pts listentries -users -groups - Name ID Owner Creator - system:administrators -204 -204 -204 - system:anyuser -101 -204 -204 - system:authuser -102 -204 -204 - anonymous 32766 -204 -204 - admin 1 -204 32766 - pat 100 -204 1 - smith 101 -204 1 - pat:friends -206 100 100 - staff -207 -204 1 - --
Privilege Required -
The issuer must belong to the system:administrators - group. -
Related Information -
pts -
-
- -
-
-
Purpose -
Displays the max user id and max group id counters -
Synopsis -
pts listmax [-cell <cell name>] [-noauth] [-force] [-help] - - pts listm [-c <cell name>] [-n] [-f] [-h] --
Description -
The pts listmax command displays the values of the max user - id and max group id counters, which the Protection Server - uses to track the AFS user IDs (AFS UIDs) it allocates to new users or - machines, and the AFS group IDs (AFS GIDs) it allocates to new groups, - respectively. When an administrator next issues the pts - createuser command and does not include the -id argument, the - new user or machine receives an AFS UID one greater than the max user - id counter, and when a user issues the pts creategroup - command and does not include the -id argument, the new group - receives an AFS UID one less (more negative) than the max group id - counter. -
To reset one or both counters, members of the - system:administrators group can issue the pts - setmax command. -
Options -
Output -
The command displays the counters in the following format: -
Max user id is user_counter and max group id is group_counter. - --
Examples -
The following example displays the output of this command: -
% pts listmax - Max user name is 1271 and max group id is -382. - --
Privilege Required -
None -
Related Information -
pts -
-
- -
-
-
Purpose -
Displays the Protection Database groups owned by a user or group -
Synopsis -
pts listowned -nameorid <user or group name or id>+ [-cell <cell name>] - [-noauth] [-force] [-help] - - pts listo -na <user or group name or id>+ [-c <cell name>] - [-no] [-f] [-h] --
Description -
The pts listowned command lists the groups owned by each user or - group specified by the -nameorid argument. -
To list any orphaned groups, whose owners have themselves been - deleted from the Protection Database, provide a value of 0 (zero) - for the -nameorid argument. To change the owner to a user or - group that still exists, use the pts chown command. -
Options -
A value of 0 (zero) lists group entries for groups whose owners - no longer have entries in the Protection Database. -
Output -
The first line of the output indicates the name and AFS UID or AFS GID of - each user or group for which ownership information is requested, in the - following format: -
Groups owned by name (id: ID) are: - --
A list of groups follows. The list does not include groups owned by - groups that the user or group owns, or to which the user or group - belongs. If the user or group does not own any groups, only the header - line appears. -
The following error message appears if the issuer is not privileged to view - ownership information. By default, for both user and group entries the - second privacy flag is the hyphen, which denies permission to anyone other - than the user (for a user entry) and the members of the - system:administrators group. -
pts: Permission denied so failed to get owner list for name (id: ID) - --
Examples -
The following example lists the groups owned by user terry and - shows that the group terry:friends does not own any - groups: -
% pts listowned terry terry:friends - Groups owned by terry (id: 1045) are: - terry:friends - terry:project1 - terry:project2 - Groups owned by terry:friends (id: -673) are: - --
Privilege Required -
The required privilege depends on the setting of the second privacy flag in - the Protection Database entry of each user or group indicated by the - -nameorid argument (use the pts examine command to - display the flags): -
Related Information -
pts -
-
- -
-
-
Purpose -
Displays the membership list for a user or group -
Synopsis -
pts membership -nameorid <user or group name or id>+ [-cell <cell name>] - [-noauth] [-force] [-help] - - pts m -na <user or group name or id>+ [-c <cell name>] [-no] [-f] [-h] - - pts groups -na <user or group name or id>+ [-c <cell name>] - [-no] [-f] [-h] - - pts g -na <user or group name or id>+ [-c <cell name>] [-no] [-f] [-h] --
Description -
The pts membership command lists the groups to which each user - or machine specified by the -nameorid argument belongs, or lists - the users and machines that belong to each group specified by the - -nameorid argument. -
It is not possible to list the members of the - system:anyuser or system:authuser groups, - and they do not appear in the list of groups to which a user belongs. -
To add users or machine to groups, use the pts adduser - command; to remove them, use the pts removeuser - command. -
Options -
Output -
For each user and machine, the output begins with the following header - line, followed by a list of the groups to which the user or machine - belongs: -
Groups name (id: AFS UID) is a member of: - --
For each group, the output begins with the following header line, followed - by a list of the users and machines who belong to the group: -
Members of group_name (id: AFS GID) are: - --
Examples -
The following example lists the groups to which the user pat - belongs and the members of the group smith:friends. - Note that third privacy flag for the pat entry was changed from the - default hyphen to enable a non-administrative user to obtain this - listing. -
% pts membership pat smith:friends - Groups pat (id: 1144) is a member of: - smith:friends - staff - johnson:project-team - Members of smith:friends (id: -562) are: - pat - terry - jones - richard - thompson - --
Privilege Required -
The required privilege depends on the setting of the third privacy flag in - the Protection Database entry of each user or group indicated by the - -nameorid argument (use the pts examine command to - display the flags): -
Related Information -
pts -
-
- -
-
-
Purpose -
Removes a user from a Protection Database group -
Synopsis -
pts removeuser -user <user name>+ -group <group name>+ - [-cell <cell name>] [-noauth] [-force] [-help] - - pts rem -u <user name>+ -g <group name>+ [-c <cell name>] - [-n] [-f] [-h] --
Description -
The pts removeuser command removes each user or machine named by - the -user argument from each group named by the -group - argument. -
To add users to a group, use the pts adduser command. To - list group membership, use the pts membership command. To - remove users from a group and delete the group's entry completely in a - single step, use the pts delete command. -
Cautions -
AFS compiles each user's group membership as he or she - authenticates. Any users who have valid tokens when they are removed - from a group retain the privileges extended to that group's members until - they discard their tokens or reauthenticate. -
Options -
Examples -
The following example removes user smith from the groups - staff and staff:finance. Note that no - switch names are necessary because only a single instance is provided for the - first argument (the username). -
% pts removeuser smith staff staff:finance - --
The following example removes three machine entries, which represent all - machines in the ABC Corporation network, from the group - bin-prot: -
% pts removeuser -user 138.255.0.0 192.12.105.0 192.12.106.0 -group bin-prot - --
Privilege Required -
The required privilege depends on the setting of the fifth privacy flag in - the Protection Database for the group named by the -group argument - (use the pts examine command to display the flags): -
(It is not possible to set the fifth flag to uppercase - R.) -
Related Information -
pts -
-
- -
-
-
Purpose -
Changes the name of a Protection Database entry -
Synopsis -
pts rename -oldname <old name> -newname <new name> - [-cell <cell name>] [-noauth] [-force] [-help] - - pts ren -o <old name> -ne <new name> [-c <cell name>] [-no] [-f] [-h] --
Description -
The pts rename command changes the name of the user, machine, or - group entry specified by the -oldname argument to the name - specified by the -newname argument. It is not possible to - change a user or machine entry's name to look like a regular group - entry's name (have a colon in it). -
Members of the system:administrators group can change a - regular group name into a prefix-less name and vice versa. When - changing a prefix-less group name into a regular group name or a regular group - name to another regular group name, the owner field of the new name (the part - before the colon) must correctly reflect the group's owner. -
Changing a regular group's owner with the pts chown command - automatically changes the owner field (the part before the colon) of the - group's name, but does not change the owner field of any groups owned by - the group. Use this command to rename those groups to a form that - accurately reflects their ownership. -
Cautions -
By convention, many aspects of an AFS user account have the same name as - the user's Protection Database entry, including the Authentication - Database entry, volume, and mount point. When using this command to - change a user name, also change the names of all related entities to maintain - consistency. For instructions, see the chapter on user accounts in the - IBM AFS Administration Guide. -
Options -
Examples -
The following example changes the name of the group staff, owned - by the privileged user admin, to - admin:staff: -
% pts rename -oldname staff -newname admin:staff - --
The following example changes the name of the group - admin:finance to the group finance. The - issuer must belong to the system:administrators group. -
% pts rename -oldname admin:finance -newname finance - --
Privilege Required -
To change a regular group name to a prefix-less name or vice versa, or to - change a user or machine entry's name, the issuer must belong to the - system:administrators group. -
To change a group name to a new name of the same type (regular or - prefix-less), the issuer must own the group or belong to the - system:administrators group. -
Related Information -
pts -
-
- -
-
-
Purpose -
Sets privacy flags or the group-creation quota for a Protection Database - entry. -
Synopsis -
pts setfields -nameorid <user or group name or id>+ - [-access <set privacy flags>] - [-groupquota <set limit on group creation>] - [-cell <cell name>] [-noauth] [-force] [-help] - - pts setf -na <user or group name or id>+ [-a <set privacy flags>] - [-g <set limit on group creation>] [-c <cell name>] - [-no] [-f] [-h] --
Description -
The pts setfields command sets the group-creation quota, the - privacy flags, or both, associated with each user, machine, or group entry - specified by the -nameorid argument. -
To examine the current quota and privacy flags, use the pts - examine command. -
Cautions -
Changing a machine or group's group-creation quota is allowed, but not - recommended. The concept is meaningless for machines and groups, - because it is impossible to authenticate as a group or machine. -
Similarly, some privacy flag settings do not have a sensible - interpretation. The Arguments section specifies the - appropriate settings. -
Options -
Set each flag to achieve the desired combination of permissions. If - the following list does not mention a certain setting, it is not - acceptable. For further discussion of the privacy flags, see the - pts examine reference page. -
Examples -
The following example changes the privacy flags on the group - operators, retaining the default values of the first, second and - third flags, but setting the fourth and fifth flags to enable the group's - members to add and remove other members. -
% pts setfields -nameorid operators -access S-Mar - --
The following example changes the privacy flags and sets group quota on the - user entry admin. It retains the default values of the - first, fourth, and fifth flags, but sets the second and third flags, to enable - anyone to list the groups that admin owns and belongs to. - Users authenticated as admin can create an additional 50 - groups. -
% pts setfields -nameorid admin -access SOM-- -groupquota 50 - --
Privilege Required -
To edit group entries or set the privacy flags on any type of entry, the - issuer must own the entry or belong to the - system:administrators group. To set group-creation - quota on a user entry, the issuer must belong to the - system:administrators group. -
Related Information -
pts -
-
- -
-
-
Purpose -
Sets the value of the max group id or max user id - counter -
Synopsis -
pts setmax [-group <group max>] [-user <user max>] [-cell <cell name>] - [-noauth] [-force] [-help] - - pts setm [-g group max>] [-u <user max>] [-c <cell name>] [-n] [-f] [-h] --
Description -
The pts setmax command sets the value of one or both counters - that track the IDs the Protection Server allocates to new users, machines, or - groups: the max user id counter for the AFS user IDs (AFS - UIDs) assigned to users and machines, and the max group id counter - for the AFS group IDs (AFS GIDs) assigned to groups. -
Use the pts listmax command to display the current value of both - counters. -
Options -
Examples -
The following command sets the max group id counter to -500 and - the max user id counter to 1000. -
% pts setmax -group -500 -user 1000 - --
Privilege Required -
The issuer must belong to the system:administrators - group. -
Related Information -
pts -
-
- -
-
-
Purpose -
Initializes the Protection Server -
Synopsis -
ptserver [-database <db path>] [-p <number of processes>] [-rebuildDB] - [-enable_peer_stats] [-enable_process_stats] [-help] --
This command does not use the syntax conventions of the AFS command - suites. Provide the command name and all option names in full. -
Description -
The ptserver command initializes the Protection Server, which - must run on every database server machine. In the conventional - configuration, its binary file is located in the /usr/afs/bin - directory on a file server machine. -
The ptserver command is not normally issued at the command shell - prompt, but rather placed into a database server machine's - /usr/afs/local/BosConfig file with the bos create - command. If it is ever issued at the command shell prompt, the issuer - must be logged onto a file server machine as the local superuser - root. -
The Protection Server performs the following tasks: -
Options -
Examples -
The following bos create command creates a ptserver - process on the machine fs3.abc.com. The - command appears here on multiple lines only for legibility. -
% bos create -server fs3.abc.com -instance ptserver \ - -type simple -cmd /usr/afs/bin/ptserver - --
Privilege Required -
The issuer must be logged in as the superuser root on a file - server machine to issue the command at a command shell prompt. It is - conventional instead to create and start the process by issuing the bos - create command. -
Related Information -
pts -
-
- -
-
-
Purpose -
Copies a file on a remote machine -
Synopsis -
rcp [-p] <file1> <file2> - - rcp [-r] [-p] <file>+ <directory> --
Description -
The AFS-modified rcp program functions like the standard UNIX - rcp program, but also passes the issuer's AFS token to the - remote machine's Cache Manager, to enable authenticated access to the AFS - filespace via that machine. -
Token passing is most effective if both the remote machine and local - machine belong to the same cell, because the rcp command can pass - only one token even if the user has several tokens--it passes the token - listed first in the output from the tokens command. If the - remote and local machine do not belong to the same cell, the possibilities are - as follows: -
In addition to running the AFS version of the rcp binary on the - machine where the rcp command is issued, other configuration - changes are necessary for token passing to work properly. See the - Cautions section for a list. -
The AFS version of the rcp command is compatible with the - standard inetd command, but token passing works only if both - programs are modified to handle AFS tokens. If only one of them is - modified, the issuer accesses the AFS filespace through the remote machine as - the anonymous user. -
Cautions -
The AFS distribution does not include an AFS-modified version of this - command for every system type, in some cases because the operating system - vendor has already modified the standard version in the required way. - For details, see the IBM AFS Release Notes. -
The AFS rcp command does not allow third party copies, in which - neither the source file nor the target file is stored on the machine where the - command is issued. The standard UNIX rcp command claims to - provide this functionality. -
For security's sake, use the AFS version of the rcp command - only in conjunction with PAGs, either by using an AFS-modified login utility, - issuing the pagsh command before obtaining tokens, or including the - -setpag flag to the klog command. -
Several configuration requirements and restrictions are necessary for token - passing to work correctly with an AFS-modified version of the rcp - command. Some of these are also necessary with the standard UNIX - version, but are included here because the issuer accustomed to AFS - protections is possibly unlikely to consider them. There are possibly - other UNIX-based requirements and restrictions not mentioned here; - consult the UNIX manual page. (One important one is that no - stty commands can appear in the issuer's shell initialization - file, such as the .cshrc file.) -
The requirements and restrictions for token passing include the - following. -
Options -
Consult the UNIX manual page for the rcp command. -
Privilege Required -
None -
Related Information -
tokens -
UNIX manual page for rcp -
IBM AFS Release Notes -
-
- -
-
-
Purpose -
Opens a shell on a remote machine -
Synopsis -
rsh host [-n] [-l <username>] <command> - - host [-n] [-l <username>] <command> --
Description -
The AFS-modified rsh program functions like the standard UNIX - rsh program, but also passes the issuer's AFS token to the - remote machine's Cache Manager, to enable authenticated access to the AFS - filespace via that machine. -
Token passing is most effective if both the remote machine and local - machine belong to the same cell, because the rsh program can pass - only one token even if the user has several tokens--it passes the token - listed first in the output from the tokens command. If the - remote and local machine do not belong to the same cell, the first token must - be valid for the remote machine's cell, in order for the remote - cell's server processes to recognize the issuer as authenticated. -
In addition to running the AFS version of the rsh binary on the - machine where the rsh command is issued, other configuration - changes are necessary for token passing to work properly. See the - Cautions section for a list. -
The AFS version of the rsh command is compatible with the - standard UNIX inetd command, but token passing works only if both - programs are modified to handle AFS tokens. If only one of them is - modified, the issuer accesses the AFS filespace through the remote machine as - the user anonymous. -
Cautions -
Some operating systems assign an alternate name to this program, such as - remsh. The version included in the AFS distribution uses the - same name as the operating system. -
The AFS distribution does not include an AFS-modified version of this - command for every system type, in some cases because the operating system - vendor has already modified the standard version in the required way. - For details, see the IBM AFS Release Notes. -
For security's sake, use the AFS version of the rsh command - only in conjunction with PAGs, either by using an AFS-modified login utility, - issuing the pagsh command before obtaining tokens, or including the - -setpag flag to the klog command. -
Several configuration requirements and restrictions are necessary for token - passing to work correctly with the AFS version of the rsh - command. Some of these are also necessary with the standard UNIX - version, but are included here because the issuer used to AFS protections is - possibly unlikely to think of them. There are possibly other UNIX-based - requirements or restrictions not mentioned here; consult the UNIX manual - page for the rsh command. (One important one is that no - stty commands can appear in the issuer's shell initialization - file, such as the .cshrc file.) -
The requirements and restrictions for token passing include the - following. -
Options -
Consult the UNIX manual page for the rsh command. -
Privilege Required -
None -
Related Information -
tokens -
UNIX manual page for rsh or remsh -
IBM AFS Release Notes -
-
- -
-
-
Purpose -
Initializes the Network Time Protocol Daemon -
Synopsis -
runntp [-localclock] [-precision <small negative integer>] - [-logfile <filename for ntpd's stdout/stderr>] - [-ntpdpath <pathname of ntpd executable (/usr/afs/bin/ntpd)>] - [<host>+] [-help] --
This command does not use the syntax conventions of the AFS command - suites. Provide the command name and all option names in full. -
Description -
The runntp command initializes the Network Time Protocol Daemon - (NTPD) and related programs on the local machine and constructs an - ntp.conf configuration file. The intended use is on - AFS file server machines as a convenient interface to the standard - ntpd program. -
In the conventional configuration, the binary file for the command is - located in the /usr/afs/bin directory on a file server - machine. The command is not normally issued at the command shell - prompt, but rather placed into a file server machine's - /usr/afs/local/BosConfig file with the bos create - command. If it is ever issued at the command shell prompt, the issuer - must be logged onto a server machine as the local superuser - root. -
Cautions -
Do not run the runntp program if NTPD or another time protocol - is already in use in the cell. Running two time-synchronization - protocols can cause errors. -
Options -
For example, a value of -6, which translates to - 2-6 or 1/64, means that the local clock ticks once every - 1/64th of a second, or has a precision of about 60 ticks per second. A - value of -7 translates to about 100 ticks per second. A - value of -10 translates to about 1000 ticks per second (a - millisecond clock). -
In general, this argument is necessary only on the system control - machine. If the issuer omits it, then the local machine consults the - local database server machines listed in its copy of the - /usr/afs/etc/CellServDB file. -
For advice on selecting appropriate time sources, see the IBM AFS - Quick Beginnings or ask AFS Product Support. -
Privilege Required -
The issuer must be logged in as the superuser root on a file - server machine to issue the command at a command shell prompt. It is - conventional instead to create and start the process by issuing the bos - create command. -
Related Information -
UNIX manual page for ntp -
UNIX manual page for ntpd -
UNIX manual page for ntpdc -
-
- -
-
-
Purpose -
Provides debugging trace of Rx activity -
Synopsis -
rxdebug -servers <server machine> [-port <IP port>] [-nodally] - [-allconnections] [-rxstats] [-onlyserver] [-onlyclient] - [-onlyport <show only <port>>] [-onlyhost <show only <host>>] - [-onlyauth <show only <auth level>>] [-version] [-noconns] - [-peers] [-help] - - rxdebug -s <server machine> [-po <IP port>] [-nod] [-a] [-r] - [-onlys] [-onlyc] [-onlyp <show only <port>>] - [-onlyh <show only <host>>] [-onlya <show only <auth level>>] - [-v] [-noc] [-pe] [-h] --
Description -
The rxdebug command provides a trace of Rx activity for the - server or client machine named by the -servers argument. Rx - is AFS's proprietary remote procedure call (RPC) protocol, so this - command enables the issuer to check the status of communication between the - Cache Manager or an AFS server process (as specified with the -port - argument) on the machine and one or more processes on other machines. -
Options -
7000 for the File Server (fileserver process) -
7001 for the Cache Manager (specifically, its callback - interface) -
7002 for the Protection Server (ptserver process) -
7003 for the Volume Location (VL) Server (vlserver - process) -
7004 for the Authentication Server (kaserver - process) -
7005 for the Volume Server (volserver process) -
7007 for the BOS Server (bosserver process) -
7008 for the Update Server (upserver process) -
7009 for the NFS/AFS Translator's rmtsysd - daemon -
7021 for the Backup Server (buserver process) -
7025 through 65535 for the Backup Tape Coordinator - (butc process) that has the port offset number derived by - subtracting 7025 from this value -
Output -
If any options other than -version or -help are - provided, the output written to the standard output stream begins with basic - statistics about packet usage and availability, how many calls are waiting for - a thread, how many threads are free, and so on (this is the only information - provided by the -noconns flag). Adding other options - produces additional information as described in the preceding - Options section of this reference page. The output is - intended for debugging purposes and is meaningful to someone familiar with the - implementation of Rx. -
Privilege Required -
None. -
Related Information -
afsd -
buserver -
butc -
kaserver -
ptserver -
upclient -
upserver -
vlserver -
-
- -
-
-
Purpose -
Initializes the Salvager component of the fs process -
Synopsis -
salvager [initcmd] [-partition <Name of partition to salvage>] - [-volumeid <Volume Id to salvage>] [-debug] - [-nowrite] [-inodes] [-force] [-oktozap] - [-rootinodes] [-salvagedirs] [-blockreads] - [-parallel <# of max parallel partition salvaging>] - [-tmpdir <Name of dir to place tmp files>] - [-showlog] [-showsuid] [-showmounts] - [-orphans <ignore | remove | attach>] [-help] --
This command does not use the syntax conventions of the AFS command - suites. Provide the command name and all option names in full. -
Description -
The salvager command initializes the Salvager component of the - fs process. In the conventional configuration, its binary - file is located in the /usr/afs/bin directory on a file server - machine. -
The Salvager restores internal consistency to corrupted read/write volumes - on the local file server machine where possible. For read-only or - backup volumes, it inspects only the volume header: -
Unlike other server process initialization commands, the - salvager command is designed to be issued at the command shell - prompt, as well as being placed into a file server machine's - /usr/afs/local/BosConfig file with the bos create - command. It is also possible to invoke the Salvager remotely by issuing - the bos salvage command. -
Combine the command's options as indicated to salvage different - numbers of read/write volumes: -
The Salvager normally salvages only those read/write volumes that are - marked as having been active when a crash occurred. To have it salvage - all relevant read/write volumes, add the -force flag. -
The Salvager normally creates new inodes as it repairs damage. If - the partition is so full that there is no room for new inodes, use the - -nowrite argument to bringing undamaged volumes online without - attempting to salvage damaged volumes. Then use the vos move - command to move one or more of the undamaged volumes to other partitions, - freeing up the space that the Salvager needs to create new inodes. -
By default, multiple Salvager subprocesses run in parallel: one for - each partition up to four, and four subprocesses for four or more - partitions. To increase or decrease the number of subprocesses running - in parallel, provide a positive integer value for the -parallel - argument. -
If there is more than one server partition on a physical disk, the Salvager - by default salvages them serially to avoid the inefficiency of constantly - moving the disk head from one partition to another. However, this - strategy is often not ideal if the partitions are configured as logical - volumes that span multiple disks. To force the Salvager to salvage - logical volumes in parallel, provide the string all as the value - for the -parallel argument. Provide a positive integer to - specify the number of subprocesses to run in parallel (for example, - -parallel 5all for five subprocesses), or omit the integer to run - up to four subprocesses, depending on the number of logical volumes being - salvaged. -
The Salvager creates temporary files as it runs, by default writing them to - the partition it is salvaging. The number of files can be quite large, - and if the partition is too full to accommodate them, the Salvager terminates - without completing the salvage operation (it always removes the temporary - files before exiting). Other Salvager subprocesses running at the same - time continue until they finish salvaging all other partitions where there is - enough disk space for temporary files. To complete the interrupted - salvage, reissue the command against the appropriate partitions, adding the - -tmpdir argument to redirect the temporary files to a local disk - directory that has enough space. -
The -orphans argument controls how the Salvager handles orphaned - files and directories that it finds on server partitions it is - salvaging. An orphaned element is completely inaccessible - because it is not referenced by the vnode of any directory that can act as its - parent (is higher in the filespace). Orphaned objects occupy space on - the server partition, but do not count against the volume's quota. -
To generate a list of all mount points that reside in one or more volumes, - rather than actually salvaging them, include the -showmounts - flag. -
Options -
The BOS Server never starts more Salvager subprocesses than there are - partitions, and always starts only one process to salvage a single - volume. If this argument is omitted, up to four Salvager subprocesses - run in parallel. -
_ _ORPHANFILE_ _.index for files -
_ _ORPHANDIR_ _.index for directories -
-
where index is a two-digit number that uniquely identifies each - object. The orphans are charged against the volume's quota and - appear in the output of the ls command issued against the - volume's root directory. -
Examples -
The following command instructs the Salvager to attempt to salvage the - volume with volume ID 258347486 on /vicepg on the local - machine. -
% /usr/afs/bin/salvager -partition /vicepg -volumeid 258347486 - --
Privilege Required -
To issue the command at the shell prompt, the issuer must be logged in as - the local superuser root. -
Related Information -
vos move -
-
- -
-
-
Purpose -
Monitors the File Server process -
Synopsis -
scout [initcmd] -server <FileServer name(s) to monitor>+ - [-basename <base server name>] - [-frequency <poll frequency, in seconds>] [-host] - [-attention <specify attention (highlighting) level>+] - [-debug <turn debugging output on to the named file>] [-help] - - scout [i] -s <FileServer name(s) to monitor>+ - [-b <base server name>] [-f <poll frequency, in seconds>] - [-ho] [-a <specify attention (highlighting) level>+] - [-d <turn debugging output on to the named file>] [-he] --
Description -
The scout command displays statistics gathered from the File - Server process running on each machine specified with the -server - argument. The Output section explains the meaning of the - statistics and describes how they appear in the command shell, which is - preferably a window managed by a window manager program. -
Cautions -
The scout program must be able to access the curses - graphics package, which it uses to display statistics. Most UNIX - distributions include curses as a standard utility. -
Both dumb terminals and windowing systems that emulate terminals can - display the scout program's statistics. The display - makes use of reverse video and cursor addressing, so the display environment - must support those features for it to look its best (most windowing systems - do, most dumb terminals do not). Also, set the TERM environment - variable to the correct terminal type, or one with characteristics similar to - the actual ones. For machines running the AIX operating system, the - recommended setting for TERM is vt100, as long as the terminal is - similar to that. For other operating systems, the wider range of - acceptable values includes xterm, xterms, - vt100, vt200, and wyse85. -
Options -
An example of an acceptable value is conn 300. -
An example of an acceptable value is disk 5000. -
An example is disk 90%. -
Example of a legal value: fetch 6000000 -
Example of an acceptable value: store 200000 -
Example of an acceptable value: ws 65 -
Output -
The scout program can display statistics either in a dedicated - window or on a plain screen if a windowing environment is not - available. For best results, the window or screen needs the ability to - print in reverse video. -
The scout screen has three main parts: the banner line, - the statistics display region and the message/probe line. -
The Banner Line -
By default, the string Scout appears in the banner line at the - top of the window or screen. Two optional arguments place additional - information in the banner line: -
For example, when the -host flag is included and the - scout program is running on the machine - client1.abc.com, the banner line reads as - follows: -
[client1.abc.com] Scout - --
Scout for abc.com - --
The Statistics Display Region -
In this region, which occupies the majority of the window, the - scout process displays the statistics gathered for each File Server - process. Each process appears on its own line. -
The region is divided into six columns, labeled as indicated and displaying - the following information: - - -
x:free_blocks - --
where x indicates the partition name. For example, - a:8949 specifies that the /vicepa - partition has 8,949 1-KB blocks free. Available space can be displayed - for up to 26 partitions. If the window is not wide enough for all - partition entries to appear on a single line, the scout process - automatically creates multiple lines, stacking the partition entries into - sub-columns within the sixth column. -
The label on the Disk attn column indicates the - threshold value at which entries in the column become highlighted. By - default, the label is -
Disk attn: > 95% used - --
because by default the scout program highlights the entry for - any partition that is over 95% full. -
For all columns except the fifth (file server machine name), the optional - -attention argument sets the value at which entries in the column - are highlighted to indicate that a certain value has been exceeded. - Only values in the fifth and Disk attn columns ever become - highlighted by default. -
If the scout program is unable to access or otherwise obtain - information about a partition, it generates a message similar to the following - example: -
Could not get information on server fs1.abc.com partition /vicepa - --
The Message/Probe Line -
The bottom line of the scout screen indicates how many times the - scout program has probed the File Server processes for - statistics. The statistics gathered in the latest probe appear in the - statistics display region. The -frequency argument overrides - the default probe frequency of 60 seconds. -
Examples -
See the chapter on monitoring tools in the IBM AFS Administration - Guide, which illustrates the displays that result from different - combinations of options. -
Privilege Required -
None -
Related Information -
fstrace -
-
- -
-
-
Reports the CPU/operating system type -
Synopsis -
sys --
Description -
The fs sysname command displays the string stored in kernel memory that - indicates the local machine's CPU/operating system (OS) type. The - Cache Manager substitutes the string for the @sys variable which can - occur in AFS pathnames; the IBM AFS Quick Beginnings and - IBM AFS Administration Guide explain how using @sys can - simplify cell configuration. -
The command always reports the value for the local machine only. To - set a new value in kernel memory, use the fs sysname command, which - like this command can also be used to display the current value. -
Output -
The machine's system type appears as a text string: -
system_type - --
Examples -
The following example shows the output produced on a Sun SPARCStation - running Solaris 5.7: -
% fs sysname - sun4x_57 - --
Privilege Required -
None -
Related Information -
IBM AFS Quick Beginnings -
IBM AFS Administration Guide -
-
- -
-
-
Purpose -
Displays the issuer's tokens -
Synopsis -
tokens [-help] - - tokens [-h] --
Description -
The tokens command displays all tokens (tickets) cached on the - local machine for the issuer. AFS server processes require that their - clients present a token as evidence that they have authenticated in the - server's local cell. -
Note: | The tokens.krb version of this command is intended for use - by sites that employ standard Kerberos authentication for their - clients. The tokens.krb command provides all of the - functionality of the tokens command. In addition, it - provides information on the Kerberos tickets stored in the file specified by - the KRBTKFILE environment variable (the /tmp/tktX file, - where X is the number of the user's PAG). - |
Options -
Output -
The output lists one token for each cell in which the user is - authenticated. The output indicates the -
The output of the Kerberos version of this command, - tokens.krb, also reports the following about the Kerberos - ticket-granting ticket: the ticket owner, which Kerberos ticket-granting - service that issued the ticket (for example, - krbtgt.ABC.COM), and ticket's expiration - date. -
The string --End of list-- appears at the end of the - output. If the user is not authenticated in any cell, this line is all - that appears. -
Examples -
The following example shows the output when the issuer is not authenticated - in any cell. -
% tokens - Tokens held by the Cache Manager: - - --End of list-- - --
The following example shows the output when the issuer is authenticated in - ABC Corporation cell, where he or she has AFS UID 1000. -
% tokens - Tokens held by the Cache Manager: - - User's (AFS ID 1000) tokens for afs@abc.com [Expires Jan 2 10:00] - --End of list-- - --
The following example shows the output when the issuer is authenticated in - the ABC Corporation cell, the State University cell, and the XYZ Company - cell. The user has different AFS UIDs in the three cells. Tokens - for last cell are expired: -
% tokens - Tokens held by the Cache Manager: - - User's (AFS ID 1000) tokens for afs@abc.com [Expires Jan 3 10:00] - User's (AFS ID 4286) tokens for afs@stateu.edu [Expires Jan 3 1:34] - User's (AFS ID 22) tokens for afs@xyz.com [>>Expired<] - --End of list-- - --
The following example shows the output when the issuer uses the - tokens.krb version of the command after authenticating in - the ABC Corporation cell using the klog.krb command. -
% tokens.krb - Tokens held by the Cache Manager: - - User's (AFS ID 1000) tokens for afs@abc.com [Expires Jan 31 00:09] - User smiths tokens for krbtgt.ABC.COM@abc.com [Expires Jan 31 00:09] - --End of list-- - --
Privilege Required -
None -
Related Information -
klog -
unlog -
-
- -
-
-
Purpose -
Translates numbered error codes into text messages -
Synopsis -
translate_et <error number>+ --
This command does not use the syntax conventions of the AFS command - suites. Provide the command name in full. -
Description -
The translate_et command translates each specified error number - into a text message. -
Options -
Examples -
The following command translates the error numbers 1 and 4: -
% translate_et 1 4 - 1 ().1 = Not owner - 4 ().4 = Interrupted system call - --
Privilege Required -
None -
-
- -
-
-
Purpose -
Reports status of Ubik process associated with a database server process -
Synopsis -
udebug -servers <server machine> [-port <IP port>] [-long] [-help] - - udebug -s <server machine> [-p <IP port>] [-l] [-h] - --
Description -
The udebug command displays the status of the lightweight Ubik - process for the database server process identified by the -port - argument that is running on the database server machine named by the - -servers argument. The output identifies the machines where - peer database server processes are running, which of them is the - synchronization site (Ubik coordinator), and the status of the connections - between them. -
Options -
buserver or 7021 for the Backup Server -
kaserver or 7004 for the Authentication Server -
ptserver or 7002 for the Protection Server -
vlserver or 7003 for the Volume Location Server -
Output -
Several of the messages in the output provide basic status information - about the Ubik process on the machine specified by the -servers - argument, and the remaining messages are useful mostly for debugging - purposes. -
To check basic Ubik status, issue the command for each database server - machine in turn. In the output for each, one of the following messages - appears in the top third of the output. -
I am sync site . . . (#_sites servers) - - I am not sync site --
For the synchronization site, the following message indicates that all - sites have the same version of the database, which implies that Ubik is - functioning correctly. See the following for a description of values - other than 1f. -
Recovery state 1f --
For correct Ubik operation, the database server machine clocks must agree - on the time. The following messages, which are the second and third - lines in the output, report the current date and time according to the - database server machine's clock and the clock on the machine where the - udebug command is issued. -
Host's IP_addr time is dbserver_date/time - Local time is local_date/time (time differential skew secs) --
The skew is the difference between the database server machine - clock and the local clock. Its absolute value is not vital for Ubik - functioning, but a difference of more than a few seconds between the - skew values for the database server machines indicates that their - clocks are not synchronized and Ubik performance is possibly hampered. -
Following is a description of all messages in the output. As noted, - it is useful mostly for debugging and most meaningful to someone who - understands Ubik's implementation. -
The output begins with the following messages. The first message - reports the IP addresses that are configured with the operating system on the - machine specified by the -servers argument. As previously - noted, the second and third messages report the current date and time - according to the clocks on the database server machine and the machine where - the udebug command is issued, respectively. All subsequent - timestamps in the output are expressed in terms of the local clock rather than - the database server machine clock. -
Host's addresses are: list_of_IP_addrs - Host's IP_addr time is dbserver_date/time - Local time is local_date/time (time differential skew secs) --
If the skew is more than about 10 seconds, the following message - appears. As noted, it does not necessarily indicate Ubik - malfunction: it denotes clock skew between the database server machine - and the local machine, rather than among the database server machines. -
****clock may be bad --
If the udebug command is issued during the coordinator election - process and voting has not yet begun, the following message appears - next. -
Last yes vote not cast yet --
Otherwise, the output continues with the following messages. -
Last yes vote for sync_IP_addr was last_vote secs ago (sync site); - Last vote started vote_start secs ago (at date/time) - Local db version is db_version --
The first indicates which peer this Ubik process last voted for as - coordinator (it can vote for itself) and how long ago it sent the vote. - The second message indicates how long ago the Ubik coordinator requested - confirming votes from the secondary sites. Usually, the - last_vote and vote_start values are the same; a - difference between them can indicate clock skew or a slow network connection - between the two database server machines. A small difference is not - harmful. The third message reports the current version number - db_version of the database maintained by this Ubik process. It - has two fields separated by a period. The field before the period is - based on a timestamp that reflects when the database first changed after the - most recent coordinator election, and the field after the period indicates the - number of changes since the election. -
The output continues with messages that differ depending on whether the - Ubik process is the coordinator or not. -
I am sync site forever (1 server) --
I am sync site until expiration secs from now (at date/time) (#_sites servers) - Recovery state flags --
The first message reports how much longer the site remains coordinator even - if the next attempt to maintain quorum fails, and how many sites are - participating in the quorum. The flags field in the second - message is a hexadecimal number that indicates the current state of the - quorum. A value of 1f indicates complete database - synchronization, whereas a value of f means that the coordinator - has the correct database but cannot contact all secondary sites to determine - if they also have it. Lesser values are acceptable if the - udebug command is issued during coordinator election, but they - denote a problem if they persist. The individual flags have the - following meanings: -
If the udebug command is issued while the coordinator is writing - a change into the database, the following additional message appears. -
I am currently managing write transaction identifier --
I am not sync site - Lowest host lowest_IP_addr was set low_time secs ago - Sync host sync_IP_addr was set sync_time secs ago --
The lowest_IP_addr is the lowest IP address of any peer from which - the Ubik process has received a message recently, whereas the - sync_IP_addr is the IP address of the current coordinator. If - they differ, the machine with the lowest IP address is not currently the - coordinator. The Ubik process continues voting for the current - coordinator as long as they remain in contact, which provides for maximum - stability. However, in the event of another coordinator election, this - Ubik process votes for the lowest_IP_addr site instead (assuming they - are in contact), because it has a bias to vote in elections for the site with - the lowest IP address. -
For both the synchronization and secondary sites, the output continues with - the following messages. The first message reports the version number of - the database at the synchronization site, which needs to match the - db_version reported by the preceding Local db version - message. The second message indicates how many VLDB records are - currently locked for any operation or for writing in particular. The - values are nonzero if the udebug command is issued while an - operation is in progress. -
Sync site's db version is db_version - locked locked pages, writes of them for write --
The following messages appear next only if there are any read or write - locks on database records: -
There are read locks held - There are write locks held --
Similarly, one or more of the following messages appear next only if there - are any read or write transactions in progress when the udebug - command is issued: -
There is an active write transaction - There is at least one active read transaction - Transaction tid is tid --
If the machine named by the -servers argument is the - coordinator, the next message reports when the current coordinator last - updated the database. -
Last time a new db version was labelled was: - last_restart secs ago (at date/time) --
If the machine named by the -servers argument is the - coordinator, the output concludes with an entry for each secondary site that - is participating in the quorum, in the following format. -
Server( IP_address ): (db db_version) - last vote rcvd last_vote secs ago (at date/time), - last beacon sent last_beacon secs ago (at date/time), last vote was { yes | no } - dbcurrent={ 0 | 1 }, up={ 0 | 1 } beaconSince={ 0 | 1 } --
The first line reports the site's IP address and the version number of - the database it is maintaining. The last_vote field reports - how long ago the coordinator received a vote message from the Ubik process at - the site, and the last_beacon field how long ago the coordinator last - requested a vote message. If the udebug command is issued - during the coordinator election process and voting has not yet begun, the - following messages appear instead. -
Last vote never rcvd - Last beacon never sent --
On the final line of each entry, the fields have the following - meaning: -
Including the -long flag produces peer entries even when the - -servers argument names a secondary site, but in that case only the - IP_address field is guaranteed to be accurate. For example, - the value in the db_version field is usually 0.0, - because secondary sites do not poll their peers for this information. - The values in the last_vote and last_beacon fields indicate - when this site last received or requested a vote as coordinator; they - generally indicate the time of the last coordinator election. -
Examples -
This example checks the status of the Ubik process for the Volume Location - Server on the machine afs1, which is the synchronization - site. -
% udebug afs1 vlserver - Host's addresses are: 192.12.107.33 - Host's 192.12.107.33 time is Wed Oct 27 09:49:50 1999 - Local time is Wed Oct 27 09:49:52 1999 (time differential 2 secs) - Last yes vote for 192.12.107.33 was 1 secs ago (sync site); - Last vote started 1 secs ago (at Wed Oct 27 09:49:51 1999) - Local db version is 940902602.674 - I am sync site until 58 secs from now (at Wed Oct 27 09:50:50 1999) (3 servers) - Recovery state 1f - Sync site's db version is 940902602.674 - 0 locked pages, 0 of them for write - Last time a new db version was labelled was: - 129588 secs ago (at Mon Oct 25 21:50:04 1999) - - Server( 192.12.107.35 ): (db 940902602.674) - last vote rcvd 2 secs ago (at Wed Oct 27 09:49:50 1999), - last beacon sent 1 secs ago (at Wed Oct 27 09:49:51 1999), last vote was yes - dbcurrent=1, up=1 beaconSince=1 - - Server( 192.12.107.34 ): (db 940902602.674) - last vote rcvd 2 secs ago (at Wed Oct 27 09:49:50 1999), - last beacon sent 1 secs ago (at Wed Oct 27 09:49:51 1999), last vote was yes - dbcurrent=1, up=1 beaconSince=1 --
This example checks the status of the Authentication Server on the machine - with IP address 192.12.107.34, which is a secondary - site. The local clock is about 4 minutes behind the database server - machine's clock. -
% udebug 192.12.107.34 7004 - Host's addresses are: 192.12.107.34 - Host's 192.12.107.34 time is Wed Oct 27 09:54:15 1999 - Local time is Wed Oct 27 09:50:08 1999 (time differential -247 secs) - ****clock may be bad - Last yes vote for 192.12.107.33 was 6 secs ago (sync site); - Last vote started 6 secs ago (at Wed Oct 27 09:50:02 1999) - Local db version is 940906574.25 - I am not sync site - Lowest host 192.12.107.33 was set 6 secs ago - Sync host 192.12.107.33 was set 6 secs ago - Sync site's db version is 940906574.25 - 0 locked pages, 0 of them for write --
Privilege Required -
Related Information -
buserver -
kaserver -
ptserver -
vlserver -
-
- -
-
-
Purpose -
Discards all of the issuer's tokens -
Synopsis -
unlog [-cell <cell name>+] [-help] - - unlog [-c <cell name>+] [-h] --
Description -
The unlog command by default discards all tokens that the issuer - currently holds. To discard tokens for certain cells only, name them - with the -cell argument. -
Since a token pertains to one client machine only, destroying tokens on one - machine has no effect on tokens on another machine. -
Cautions -
Specifying one or more cell names can cause a brief authentication outage - during which the issuer has no valid tokens in any cell. This is - because the command actually discards all tokens and then restores the ones - for cells not named by the -cell argument. The outage can - sometimes interrupt the operation of jobs that require authentication. -
Options -
Examples -
The following command discards all tokens. -
% unlog - --
The following command discards only the tokens for the - abc.com and stateu.edu cells. -
% unlog -cell abc.com stateu - --
Privilege Required -
None -
Related Information -
klog -
tokens -
-
- -
-
-
Purpose -
Recursively copies the contents of a source directory to a destination - directory. -
Synopsis -
up [-v] [-1] [-f] [-r] [-x] <source directory> <destination directory> --
This command does not use the syntax conventions of the AFS command - suites. Provide the command name and all option names in full. -
Description -
The up command recursively copies the files and subdirectories - in a specified source directory to a specified destination directory. - The command interpreter changes the destination directory and the files and - subdirectories in it in the following ways: -
The up command is idempotent, meaning that if its execution is - interrupted by a network, server machine, or process outage, then a subsequent - reissue of the same command continues from the interruption point, rather than - starting over at the beginning. This saves time and reduces network - traffic in comparison to the UNIX commands that provide similar - functionality. -
The up command returns a status code of 0 (zero) only - if it succeeds. Otherwise, it returns a status code of 1 - (one). -
Options -
Examples -
The following command copies the contents of the directory dir1 to - directory dir2: -
% up dir1 dir2 - --
Privilege Required -
The issuer must have the a (administer) permission on - the ACL of both the source and destination directories. -
-
- -
-
-
Purpose -
Initializes the client portion of the Update Server -
Synopsis -
upclient <hostname> [-crypt] [-clear] [-t <retry time>] - [-verbose]* <dir>+ [-help] --
This command does not use the syntax conventions of the AFS command - suites. Provide the command name and all option names in full. -
Description -
The upclient command initializes the client portion of the - Update Server. In the conventional configuration, its binary file is - located in the /usr/afs/bin directory on a file server - machine. -
The upclient command is not normally issued at the command shell - prompt but rather placed into a file server machine's - /usr/afs/local/BosConfig file with the bos create - command. If it is ever issued at the command shell prompt, the issuer - must be logged onto a database server machine as the local superuser - root. -
The upclient process periodically checks that all files in each - local directory named by the dir argument match the files in the - corresponding directory on the source machine named by the - hostnameargument. If a file does not match, the - upclient process requests the source copy from the - upserver process running on the source machine. -
By default, the upclient process in the United States edition of - AFS requests that the upserver process encrypt the data before - transferring it, whereas in the international edition it requests unencrypted - transfer. If using the United States edition, use the -clear - flag to request unencrypted transfer if appropriate. (The - -crypt flag explicitly sets the default in the United States - edition, and is not available in the international edition.) -
In the conventional configuration, separate instances of the - upclient process request data from the /usr/afs/bin and - /usr/afs/etc directories, except on machines for which the system - control machine is also the binary distribution machine for the machine's - system type. The conventional names for the separate instances are - upclientbin and upclientetc respectively. -
The upclient and upserver processes always mutually - authenticate, whether or not the data they pass is encrypted; they use - the key with the highest key version number in the - /usr/afs/etc/KeyFile file to construct a server ticket for mutual - authentication. -
Cautions -
Do not use the Update Server to distribute the contents of the - /usr/afs/etc directory if using the international edition of - AFS. The contents of this directory are sensitive and the international - edition of AFS does not include the encryption routines necessary for - encrypting files before transfer across the network. -
Options -
Note: | This flag is not available in the international edition of AFS. - |
As a reminder, do not use the Update Server to transfer the contents of the - /usr/afs/etc directory if using the international edition of - AFS. -
Examples -
The following bos create command creates an - upclientbin process on the machine - fs4.abc.com that refers to the machine - fs1.abc.com as the source for the - /usr/afs/bin directory (thus fs1.abc.com - is the binary distribution machine for machines of - fs4.abc.com's type). The files in the - /usr/afs/bin directory are distributed every 120 seconds. - The command requests transfer in unencrypted form. -
% bos create -server fs4.abc.com -instance upclientbin -type simple \ - -cmd "/usr/afs/bin/upclient fs1.abc.com -clear \ - -t 120 /usr/afs/bin" - --
Privilege Required -
The issuer must be logged in as the superuser root on a file - server machine to issue the command at a command shell prompt. It is - conventional instead to create and start the process by issuing the bos - create command. -
Related Information -
upserver -
-
- -
-
-
Purpose -
Initializes the server portion of the Update Server -
Synopsis -
upserver [<directory>+] [-crypt <directory>+] [-clear <directory>+] - [-auth <directory>+] [-help] --
This command does not use the syntax conventions of the AFS command - suites. Provide the command name and all option names in full. -
Description -
The upserver command initializes the server portion of the - Update Server (the upserver process). In the conventional - configuration, its binary file is located in the /usr/afs/bin - directory on a file server machine. -
The upserver command is not normally issued at the command shell - prompt but rather placed into a file server machine's - /usr/afs/local/BosConfig file with the bos create - command. If it is ever issued at the command shell prompt, the issuer - must be logged onto a database server machine as the local superuser - root. -
The upserver command specifies which of the directories on the - local disk are eligible for distribution in response to requests from the - client portion of the Update Server (the upclient process) running - on other machines. If no directories are specified, the - upserver process distributes the contents of any directory on its - local disk. -
The upserver process can distribute a directory's contents - in encrypted or unencrypted form. By default, it does not use - encryption unless an upclient process requests it (this default is - equivalent to setting the -clear flag). When the - -crypt flag is provided, the upserver process only - fulfills requests for encrypted transfer. -
For the United States edition of AFS, using the -crypt flag - guarantees that the upserver process transfers a directory's - contents only in encrypted form. For the international edition, using - the -crypt flag completely blocks data transfer, because the - international edition of the upclient process cannot request - encrypted transfer (the upclient initialization command does not - include the -crypt flag). -
The upclient and upserver processes always mutually - authenticate, whether or not the data they pass is encrypted; they use - the key with the highest key version number in the - /usr/afs/etc/KeyFile file to construct a server ticket for mutual - authentication. -
Cautions -
Do not use the Update Server to distribute the contents of the - /usr/afs/etc directory if using the international edition of - AFS. The contents of this directory are sensitive and the international - edition of AFS does not include the encryption routines necessary for - encrypting files before transfer across the network. -
Options -
Examples -
The following example bos create command defines and starts an - upserver process on the host machine - fs1.abc.com. The last parameter (enclosed in - quotes) instructs the upserver process to distribute the contents - of the /usr/afs/bin directory in unencrypted form and the contents - of the /usr/afs/etc directory in encrypted form. -
% bos create -server fs1.abc.com -instance upserver -type simple \ - -cmd "/usr/afs/bin/upserver /usr/afs/bin -crypt /usr/afs/etc" --
Privilege Required -
The issuer must be logged in as the superuser root on a file - server machine to issue the command at a command shell prompt. It is - conventional instead to create and start the process by issuing the bos - create command. -
Related Information -
upclient -
-
- -
-
-
Purpose -
Introduction to the uss command suite -
Description -
The commands in the uss command suite help administrators to - create AFS user accounts more easily and efficiently. If uss - commands are not used, creating an account requires issuing at least six - separate commands to five different AFS servers. -
There are three main commands in the suite: -
To obtain help, issue the uss apropos and uss help - commands. -
Options -
The following arguments and flags are available on many commands in the - uss suite. The reference page for each command also lists - them, but they are described here in greater detail. -
Privilege Required -
The issuer of a uss command must have all the rights required - for performing the equivalent actions individually. See each - uss command's reference page. -
Related Information -
uss add -
uss bulk -
uss help -
-
- -
-
-
Purpose -
Creates a user account -
Synopsis -
uss add -user <login name> [-realname <full name in quotes>] - [-pass <initial password>] - [-pwexpires <password expires in [0..254] days (0 => never)>] - [-server <FileServer for home volume>] - [-partition <FileServer's disk partition for home volume>] - [-mount <home directory mount point>] - [-uid <uid to assign the user>] - [-template <pathname of template file>] - [-verbose] [-var <auxiliary argument pairs (Num val)>+] - [-cell <cell name>] [-admin <administrator to authenticate>] - [-dryrun] [-skipauth] [-overwrite] [-help] - - uss ad -us <login name> [-r <full name in quotes>] - [-pas <initial password>] - [-pw <password expires in [0..254] days (0 => never)>] - [-se <FileServer for home volume>] - [-par <FileServer's disk partition for home volume>] - [-m <home directory mount point>] [-ui <uid to assign the user>] - [-t <pathname of template file>] [-ve] - [-va <auxiliary argument pairs (Num val)>+] [-c <cell name>] - [-a <administrator to authenticate>] [-d] [-sk] [-o] [-h] --
Description -
The uss add command creates entries in the Protection Database - and Authentication Database for the user name specified by the - -user argument. By default, the Protection Server - automatically allocates an AFS user ID (UID) for the new user; to specify - an alternate AFS UID, include the -uid argument. If a - password is provided with the -pass argument, it is stored as the - user's password in the Authentication Database after conversion into a - form suitable for use as an encryption key. Otherwise, the string - changeme is assigned as the user's initial password. -
The other results of the command depend on which instructions and which of - a defined set of variables appear in the template file specified with the - -template argument. Many of the command's arguments - supply a value for one of the defined variables, and failure to provide an - argument when the corresponding variable appears in the template file halts - the account creation process at the point where the command interpreter first - encounters the variable in the template file. -
To create multiple accounts with a single command, use the uss - bulk command. To delete accounts with a single command, use the - uss delete command. -
Options -
Corresponding variable in the template file: $USER. -
Corresponding variable in the template file: $NAME. Many - operating systems include a field for the full name in a user's entry in - the local password file (/etc/passwd or equivalent), and this - variable can be used to pass a value to be used in that field. -
Corresponding variable in the template file: none. -
When the password becomes invalid (expires), the user is unable to - authenticate, but has 30 more days in which to issue the kpasswd - command to change the password (after that, only an administrator can change - it). -
Corresponding variable in the template file: $PWEXPIRES. -
Corresponding variable in the template file: $SERVER. -
/vicepa = vicepa = a = 0 - /vicepb = vicepb = b = 1 - --
-
After /vicepz (for which the index is 25) comes -
/vicepaa = vicepaa = aa = 26 - /vicepab = vicepab = ab = 27 - --
and so on through -
/vicepiv = vicepiv = iv = 255 - --
-
Corresponding variable in the template file: $PART. -
Specify the read/write path to the directory, to avoid the failure that - results from attempting to create a new mount point in a read-only - volume. By convention, the read/write path is indicated by placing a - period before the cell name at the pathname's second level (for example, - /afs/.abc.com). For further discussion of the - concept of read/write and read-only paths through the filespace, see the - fs mkmount reference page. -
Corresponding variable in template: $MTPT, but in the template - file's V instruction only. Occurrences of the $MTPT - variable in template instructions that follow the V instruction - take their value from the V instruction's - mount_point field. Thus the value of this command line - argument becomes the value for the $MTPT variable in instructions that follow - the V instruction only if the string $MTPT appears alone in the - V instruction's mount_point field. -
Corresponding variable in the template file: $UID. -
-
If the issuer provides a filename other than uss.template - but without a pathname, the command interpreter searches for it in the - indicated directories. If the issuer provides a full or partial - pathname, the command interpreter consults the specified file only; it - interprets partial pathnames relative to the current working directory. -
-
If the specified template file is empty (zero-length), the command creates - Protection and Authentication Database entries only. -
The uss Template File reference page details the file's - format. -
Corresponding variables in the template file: $1 through $9. -
For each instance of this argument, provide two parts in the indicated - order, separated by a space: -
See the chapter on uss in the IBM AFS Administration - Guide for further explanation. -
Examples -
The combination of the following example uss add command and - V instruction in a template file called uss.tpl - creates Protection and Authentication Database entries named smith, - and a volume called user.smith with a quota of 2500 kilobyte - blocks, mounted at the pathname - /afs/abc.com/usr/smith. The access control list (ACL) - on the mount point grants smith all rights. -
The issuer of the uss add command provides only the template - file's name, not its complete pathname, because it resides in the current - working directory. The command and V instruction appear here - on two lines only for legibility; there are no line breaks in the actual - instruction or command. -
V user.$USER $SERVER.abc.com /vice$PART $1 \ - /afs/abc.com/usr/$USER $UID $USER all - - % uss add -user smith -realname "John Smith" -pass js_pswd -server fs2 \ - -partition b -template uss.tpl -var 1 2500 - --
Privilege Required -
The issuer (or the user named by the -admin argument) must - belong to the system:administrators group in the Protection - Database and must have the ADMIN flag turned on in his or her - Authentication Database entry. -
If the template contains a V instruction, the issuer must be - listed in the /usr/afs/etc/UserList file and must have at least - a (administer) and i (insert) - permissions on the ACL of the directory that houses the new mount - point. If the template file includes instructions for creating other - types of objects (directories, files or links), the issuer must have each - privilege necessary to create them. -
Related Information -
UserList -
uss -
uss bulk -
-
- -
-
-
Purpose -
Displays each help entry containing a keyword string. -
Synopsis -
uss apropos -topic <help string> [-help] - - uss ap -t <help string> [-h] --
Description -
The uss apropos command displays the first line of the online - help entry for any uss command that has in its name or short - description the string specified by the -topic argument. -
To display the syntax for a command, use the uss help - command. -
Options -
Output -
The first line of a command's online help entry names it and briefly - describes its function. This command displays the first line for any - uss command where the string specified by the -topic - argument is part of the command name or first line. -
Examples -
The following command lists all uss commands that include the - word create in their names or short descriptions: -
% uss apropos create - add: create a new user - --
Privilege Required -
None -
Related Information -
uss -
uss help -
-
- -
-
-
Purpose -
Executes multiple uss commands listed in a file -
Synopsis -
uss bulk -file <bulk input file> [-template <pathname of template file>] - [-verbose] [-cell <cell name>] - [-admin <administrator to authenticate>] [-dryrun] - [-skipauth] [-overwrite] - [-pwexpires <password expires in [0..254] days (0 => never)>] - [-pipe] [-help] - - uss b -f <bulk input file> [-t <pathname of template file>] [-v] - [-c <cell name>] [-a <administrator to authenticate>] [-d] [-s] - [-o] [-pw <password expires in [0..254] days (0 => never)>] - [-pi] [-h] --
Description -
The uss bulk command executes the uss commands listed - in the bulk input file specified with the -file - argument. If the bulk input file includes add instructions - that reference a template file, then the -template argument is - required. -
To create a single account, use the uss add command. To - delete one or more accounts, use the uss delete command. -
Options -
When the password becomes invalid (expires), the user is unable to - authenticate, but has 30 more days in which to issue the kpasswd - command to change the password (after that, only an administrator can change - it). -
Examples -
The following example command executes the instructions in the bulk input - file called new_students, which includes add - instructions that refer to the template file - student.template. Both files reside in the current - working directory. -
% uss bulk new_students student.template - --
Privilege Required -
The issuer (or the user named by the -admin argument) must have - the privileges necessary to run the commands that correspond to instructions - in the bulk input file. -
Related Information -
uss -
uss add -
-
- -
-
-
Purpose -
Deletes a user account -
Synopsis -
uss delete -user <login name> [-mountpoint <mountpoint for user's volume>] - [-savevolume] [-verbose] [-cell <cell name>] - [-admin <administrator to authenticate>] [-dryrun] - [-skipauth] [-help] - - uss d -u <login name> [-m <mountpoint for user's volume>] [-sa] [-v] - [-c <cell name>] -a <administrator to authenticate>] - [-d] [-sk] [-h] --
Description -
The uss delete command removes the Authentication Database and - Protection Database entries for the user named by -user - argument. In addition, it can remove the user's home volume and - associated VLDB entry, a mount point for the volume or both, depending on - whether the -mountpoint and -savevolume options are - provided. -
Options -
Specify the read/write path to the mount point, to avoid the failure that - results from attempting to remove a mount point from a read-only - volume. By convention, the read/write path is indicated by placing a - period before the cell name at the pathname's second level (for example, - /afs/.abc.com). For further discussion of the - concept of read/write and read-only paths through the filespace, see the - fs mkmount reference page. -
Examples -
The following command removes smith's user account from the - abc.com cell. The -savevolume argument - retains the user.smith volume on its file server - machine. -
% uss delete smith -mountpoint /afs/abc.com/usr/smith -savevolume - --
Privilege Required -
The issuer (or the user named by -admin argument) must belong to - the system:administrators group in the Protection Database, - must have the ADMIN flag turned on in his or her Authentication - Database entry, and must have at least a (administer) - and d (delete) permissions on the access control list - (ACL) of the mount point's parent directory. If the - -savevolume flag is not included, the issuer must also be listed in - the /usr/afs/etc/UserList file. -
Related Information -
UserList -
uss -
-
- -
-
-
Purpose -
Displays the syntax of specified uss commands or lists - functional descriptions of all uss commands -
Synopsis -
uss help [-topic <help string>+] [-help] - - uss h [-t <help string>+] [-h] --
Description -
The uss help command displays the complete online help entry - (short description and syntax statement) for each command operation code - specified by the -topic argument. If the -topic - argument is omitted, the output includes the first line (name and short - description) of the online help entry for every uss command. -
To list every uss command whose name or short description - includes a specified keyword, use the uss apropos command. -
Options -
Output -
The online help entry for each uss command consists of the - following two or three lines: -
Examples -
The following command displays the online help entry for the uss - bulk command: -
% uss help bulk - uss bulk: bulk input mode - Usage: uss bulk -file <bulk input file> [-template <pathname - of template file>] [-verbose] [-cell <cell name>] [-admin - <administrator to authenticate>] [-dryrun] [-skipauth] [-overwrite] - [-pwexpires <password expires in [0..254] days (0 => never)>] [-pipe] - [-help] - --
Privilege Required -
None -
Related Information -
uss -
-
- -
-
-
Purpose -
Checks the integrity of the VLDB -
Synopsis -
vldb_check -database <vldb_file> [-uheader] [-vheader] [-servers] - [-entries] [-verbose] [-help] - - vldb_check -d <vldb_file> [-u] [-vh] [-s] [-e] [-ve] [-h] --
Description -
The vldb_check command checks the integrity of the Volume - Location Database (VLDB), reporting any errors or corruption it finds. - If there are problems, do not issue any vos commands until the - database is repaired. -
Cautions -
The results can be unpredictable if the Volume Location (VL) Server makes - changes to the VLDB while this command is running. Use the bos - shutdown command to shutdown the local vlserver process - before running this command, or before creating a second copy of the - vldb.DB0 file (with a different name) on which to run the - command. -
Options -
Output -
If there are errors in the database, the output always reports them on the - standard error stream. If any options other than -database - or -help are provided, the output written to the standard output - stream includes additional information as described for each option in the - preceding Options section of this reference page. The output - is intended for debugging purposes and is meaningful to someone familiar with - the internal structure of the VLDB. -
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
vlserver -
-
- -
-
-
Purpose -
Initializes the Volume Location Server -
Synopsis -
vlserver [-p <lwp processes>] [-nojumbo] - [-enable_peer_stats] [-enable_process_stats] [-help] --
This command does not use the syntax conventions of the AFS command - suites. Provide the command name and all option names in full. -
Description -
The vlserver command initializes the Volume Location (VL) - Server, which runs on every database server machine. In the - conventional configuration, its binary file is located in the - /usr/afs/bin directory on a file server machine. -
The vlserver command is not normally issued at the command shell - prompt but rather placed into a file server machine's - /usr/afs/local/BosConfig file with the bos create - command. If it is ever issued at the command shell prompt, the issuer - must be logged onto a database server machine as the local superuser - root. -
As it initializes, the VL Server process creates the two files that - constitute the Volume Location Database (VLDB), vldb.DB0 and - vldb.DBSYS1, in the /usr/afs/db directory if they - do not already exist. Use the commands in the vos suite to - administer the database. -
The VL Server maintains the record of volume locations in the Volume - Location Database (VLDB). When the Cache Manager fills a file request - from an application program, it first contacts the VL Server to learn which - file server machine currently houses the volume that contains the file. - The Cache Manager then requests the file from the File Server process running - on that file server machine. -
The VL Server records a trace of its activity in the - /usr/afs/logs/VLLog file. Use the bos getlog - command to display the contents of the file. By default, it records on - a minimal number of messages. For instructions on increasing the amount - of logging, see the VLLog reference page. -
By default, the VL Server runs nine lightweight processes (LWPs). To - change the number, use the -p argument. -
Options -
Examples -
The following bos create command creates a vlserver - process on the machine fs2.abc.com that uses six - lightweight processes. Type the command on a single line: -
% bos create -server fs2.abc.com -instance vlserver -type simple \ - -cmd "/usr/afs/bin/vlserver -p 6" --
Privilege Required -
The issuer must be logged in as the superuser root on a file - server machine to issue the command at a command shell prompt. It is - conventional instead to create and start the process by issuing the bos - create command. -
Related Information -
VLLog -
-
- -
-
-
Purpose -
Produces detailed statistics about one or more volume headers and the - partition that houses them -
Synopsis -
volinfo [-online] [-vnode] [-date] [-inode] [-itime] - [-part <AFS partition name (default current partition)>+] - [-volumeid <Volume id>+] [-header] [-sizeOnly] [-fixheader] - [-saveinodes] [-orphaned] [-help] --
Description -
The volinfo command displays detailed statistics about one or - more volume headers and the partition that houses them. The command - must be issued on a file server machine and by default produces output for - every volume on every AFS server partition on the machine. To display - output for the volumes on one partition only, include the -part - argument. To display output for one volume only, include the - -volumeid argument. -
Options -
Output -
By default, the command produces several line of statistics for each - volume. Adding other options produces or substitutes additional - information as described in the preceding Options section of this - reference page. The output is intended for debugging purposes and is - meaningful to someone familiar with the internal structure of volume - headers. -
Privilege Required -
The issuer must be logged in as the local superuser root. -
Related Information -
-
- -
-
-
Purpose -
Initializes the Volume Server component of the fs process -
Synopsis -
volserver [-log] [-p <number of processes>] - [-udpsize <size of socket buffer in bytes>] - [-enable_peer_stats] [-enable_process_stats] [-help] --
This command does not use the syntax conventions of the AFS command - suites. Provide the command name and all option names in full. -
Description -
The volserver command initializes the Volume Server component of - the fs process. In the conventional configuration, its - binary file is located in the /usr/afs/bin directory on a file - server machine. -
The volserver command is not normally issued at the command - shell prompt but rather placed into a file server machine's - /usr/afs/local/BosConfig file with the bos create - command. If it is ever issued at the command shell prompt, the issuer - must be logged onto a database server machine as the local superuser - root. -
The Volume Server records a trace of its activity in the - /usr/afs/logs/VolserLog file. Use the bos getlog - command to display the contents of the file. -
The Volume Server processes the vos commands that administrators - use to create, delete, move, and replicate volumes, as well as prepare them - for archiving to tape or other media. -
By default, the VL Server runs nine lightweight processes (LWPs). To - change the number, use the -p argument. -
Options -
Examples -
The following bos create command creates a volserver - process on the machine fs2.abc.com: -
% bos create -server fs2.abc.com -instance volserver -type simple \ - -cmd /usr/afs/bin/volserver --
Privilege Required -
The issuer must be logged in as the superuser root on a file - server machine to issue the command at a command shell prompt. It is - conventional instead to create and start the process by issuing the bos - create command. -
Related Information -
vos -
-
- -
-
-
Purpose -
Introduction to the vos command suite -
Description -
The commands in the vos command suite are the administrative - interface to the Volume Server and Volume Location (VL) Server. System - administrators use vos commands to create, move, delete, replicate, - back up and examine volumes, among other operations. The VL Server - automatically records in the Volume Location Database (VLDB) changes in volume - status and location that result from vos commands. -
The operations invoked by most vos commands are idempotent, - meaning that if an operation is interrupted by a network, server machine, or - process outage, then a subsequent attempt at the same operation continues from - the interruption point, rather than starting over at the beginning of the - operation. Before executing a command, the Volume and VL Servers check - the current state of the volumes and VLDB records to be altered by the - command. If they are already in the desired end state (or a consistent - intermediate state), there is no need to repeat the internal steps that - brought them there. Idempotency does not apply if the command issuer - explicitly interrupts the operation with the <Ctrl-c> command or - another interrupt signal. In that case, the volume is left locked and - the administrator must use the vos unlock command to unlock it - before proceeding. -
It is important that the VLDB accurately indicate the status of the volumes - on file server machines at all times. The reference pages for the files - vldb.DB0 and - Vvol_ID.vol describe the information - recorded in the VLDB and volume headers, respectively. If a - vos command changes volume status, it automatically records the - change in the corresponding VLDB entry. The most common cause of - discrepancies between the VLDB and volume status on file server machines is - interrupted operations; to restore consistency, use the vos - syncserv and vos syncvldb commands. -
There are several categories of commands in the vos command - suite: -
Options -
The following arguments and flags are available on many commands in the - bos suite. The reference page for each command also lists - them, but they are described here in greater detail. -
-
Do not combine the -cell and -localauth - options. A command on which the -localauth flag is included - always runs in the local cell (as defined in the server machine's local - /usr/afs/etc/ThisCell file), whereas a command on which the - -cell argument is included runs in the specified foreign - cell. -
Use this flag only when issuing a command on a server machine; client - machines do not usually have a /usr/afs/etc/KeyFile file. - The issuer of a command that includes this flag must be logged on to the - server machine as the local superuser root. The flag is - useful for commands invoked by an unattended application program, such as a - process controlled by the UNIX cron utility or by a cron entry in - the machine's /usr/afs/local/BosConfig file. It is also - useful if an administrator is unable to authenticate to AFS but is logged in - as the local superuser root. -
Do not combine the -cell and -localauth - options. A command on which the -localauth flag is included - always runs in the local cell (as defined in the server machine's local - /usr/afs/etc/ThisCell file), whereas a command on which the - -cell argument is included runs in the specified foreign - cell. Also, do not combine the -localauth and - -noauth flags. -
/vicepa = vicepa = a = 0 - /vicepb = vicepb = b = 1 - --
-
After /vicepz (for which the index is 25) comes -
/vicepaa = vicepaa = aa = 26 - /vicepab = vicepab = ab = 27 - --
and so on through -
/vicepiv = vicepiv = iv = 255 - --
The -frompartition and -topartition arguments to the - vos move command also accept this notation. -
The -fromserver and -toserver arguments to the - vos move command also accept these name formats. -
Privilege Required -
To issue most vos commands, the issuer must be listed in the - /usr/afs/etc/UserList file on each server machine that houses or is - to house an affected volume, and on each database server machine. The - most predictable performance results if all database server and file server - machines in the cell share a common UserList file. - Alternatively, if the -localauth flag is included, the issuer must - be logged on to a server machine as the local superuser - root. -
To issue a vos command that only displays information, no - privilege is required. -
Related Information -
UserList -
vos dump -
vos help -
vos lock -
vos move -
vos zap -
-
- -
-
-
Purpose -
Adds a read-only site definition to a volume's VLDB entry -
Synopsis -
vos addsite -server <machine name for new site> - -partition <partition name for new site> - -id <volume name or ID> [-cell <cell name>] - [-noauth] [-localauth] [-verbose] [-help] - - vos ad -s <machine name for new site> -p <partition name for new site> - -i <volume name or ID> [-c <cell name>] [-n] [-l] [-v] [-h] --
Description -
The vos addsite command defines a new read-only site (partition - on a file server machine, specified by the -server and - -partition arguments) in the Volume Location Database (VLDB) entry - of the read/write volume named by the -id argument. When the - vos release command is next issued against the read/write volume, a - read-only copy of it is distributed to all of the read-only sites, including - the newly defined one. -
Cautions -
A volume's VLDB entry accommodates a maximum number of site - definitions, as defined in the IBM AFS Release Notes. The - site housing the read/write and backup versions of the volume counts as one - site, and each read-only site counts as an additional site (even the read-only - site defined on the same file server machine and partition as the read/write - site counts as a separate site). The limit in the VLDB entry - effectively determines the maximum number of copies of the volume that are - available to AFS clients. -
Attempts to create additional sites by using this command fail with an - error. -
Options -
Examples -
The following example, appropriate in the State University cell, defines a - read-only site for the cell's root.afs volume. -
% vos addsite -server sv7.stateu.edu -partition /vicepb -id root.afs - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
-
- -
-
-
Purpose -
Displays each help entry containing a keyword string -
Synopsis -
vos apropos -topic <help string> [-help] - - vos ap -t <help string> [-h] --
Description -
The vos apropos command displays the first line of the online - help entry for any vos command that has in its name or short - description the string specified by the -topic argument. -
To display the syntax for a command, use the vos help - command. -
Options -
Output -
The first line of a command's online help entry names it and briefly - describes its function. This command displays the first line for any - vos command where the string specified with the -topic - argument is part of the command name or first line. -
Examples -
The following command displays all vos commands that include the - word lock in their names or short descriptions: -
% vos apropos lock - lock: lock VLDB entry for a volume - unlock: release lock on VLDB entry for a volume - unlockvldb: unlock all the locked entries in the VLDB - --
Privilege Required -
None -
Related Information -
vos -
vos help -
-
- -
-
-
Purpose -
Creates a backup volume for a single read/write volume -
Synopsis -
- vos backup -id <volume name or ID> [-cell <cell name>] [-noauth] - [-localauth] [-verbose] [-help] - - vos backup -i <volume name or ID> [-c <cell name>] [-n] [-l] [-v] [-h] --
Description -
The vos backup command clones the indicated read/write volume to - create a backup version, placing it at the same site as the read/write - version. The backup volume's name is the same as the read/write - source's with the addition of the .backup - extension. Its volume ID number is the one allocated for it in the - Volume Location Database (VLDB) when the read/write source was created with - the vos create command. If a backup version already exists, - the new clone replaces it. -
To create a backup version of multiple volumes, use the vos - backupsys command. -
Options -
Output -
The following message confirms that the command succeeded: -
Created backup volume for volume name - --
Examples -
The following example creates a backup version of the volume - user.smith. -
% vos backup user.smith - Created backup volume for user.smith - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
-
- -
-
-
Purpose -
Creates a backup volume for several read/write volumes -
Synopsis -
vos backupsys [-prefix <common prefix on volume(s)>+] - [-server <machine name>] [-partition <partition name>] - [-exclude] [-xprefix <negative prefix on volume(s)>+] - [-dryrun] [-cell <cell name>] [-noauth] [-localauth] - [-verbose] [-help] - - vos backups [-pr <common prefix on volume(s)>+] [-s <machine name>] - [-pa <partition name>] [-e] [-x <negative prefix on volume(s)>+] - [-d] [-c <cell name>] [-n] [-l] [-v] [-h] --
Description -
The vos backupsys command clones each indicated read/write - volume to create a backup version, placing each clone at the same site as its - read/write source version. It assigns each clone the same name as the - read/write source, adding a .backup extension. It - assigns the volume ID number already allocated for the backup version in the - Volume Location Database (VLDB). If a backup version already exists for - a given volume, the new clone replaces it. -
To clone every read/write volume listed in the VLDB, omit all of the - command's options. Otherwise, combine the command's options - to clone various groups of volumes. The options use one of two basic - criteria to select volumes: location (the -server and - -partition arguments) or presence in the volume name of one of a - set of specified character strings (the -prefix, - -exclude, and -xprefix options). -
To clone only volumes that reside on one file server machine, include the - -server argument. To clone only volumes that reside on one - partition, combine the -server and -partition - arguments. The -partition argument can also be used alone to - clone volumes that reside on the indicated partition on every file server - machine. These arguments can be combined with those that select volumes - based on their names. -
Combine the -prefix, -exclude, and - -xprefix options (with or without the -server and - -partition arguments) in the indicated ways to select volumes based - on character strings contained in their names: -
If the -exclude flag is combined with the -prefix and - -xprefix arguments, the command creates a list of all volumes that - do not match the -prefix argument and then adds to the list any - volumes that match the -xprefix argument. As when the - -exclude flag is not used, the result is effective only if the - strings specified by the -xprefix argument designate a subset of - the volumes specified by the -prefix argument. -
The -prefix and -xprefix arguments both accept - multiple values, which can be used to define disjoint groups of - volumes. Each value can be one of two types: -
-prefix '^.*aix' --
To display a list of the volumes to be cloned, without actually cloning - them, include the -dryrun flag. To display a statement that - summarizes the criteria being used to select volume, include the - -verbose flag. -
This command can be used to clone a single read/write volume; specify - its complete name as the -prefix argument. However, it is - more efficient to use the vos backup command, which employs a more - streamlined technique for finding a single volume. -
Options -
This argument can be combined with any combination of the - -prefix, -partition, -exclude, and - -xprefix options. -
This argument can be combined with any combination of the - -prefix, -server, -exclude, and - -xprefix options. -
Output -
The command generates the following messages on the standard output stream - to confirm that the operation was successful: -
done - Total volumes backed up: number_cloned; failed to backup: failures --
If the -dryrun flag is included, a list of the volumes to be - backed up precedes the standard confirmation messages. -
If the -verbose flag is included but not the -dryrun - flag, the following messages appear for each volume. The output - concludes with the standard confirmation messages. -
Creating backup volume for volume_name on date/time - {Recloning backup volume | Creating a new backup clone} backup_volumeID . . .done --
If both the -dryrun and -verbose flags are included, - the output begins with a statement summarizing the criteria being used to - select the volumes, followed by a list of the volumes and the standard - confirmation messages. The format of the criteria summary statement - depends on which other options are provided: -
Would have backed up volumes which are prefixed with string [orstring] . . --
Would have backed up volumes which are not prefixed with string [norstring] . . --
Would have backed up volumes which are prefixed with string [orstring] \ - removing those which are prefixed with x_string [orx_string] . . --
Would have backed up volumes which are not prefixed with string [norstring] \ - adding those which are prefixed with x_string [orx_string] . . --
Examples -
The following example creates a backup version of every read/write volume - listed in the cell's VLDB whose name begins with the string - user. -
% vos backupsys -prefix user - --
The following example, appropriate in the ABC Corporation cell, creates a - backup version of every read/write volume on the file server machine - fs3.abc.com. -
% vos backupsys -server fs3.abc.com - --
The following example, appropriate in the State University cell, creates a - backup version of every read/write volume on the file server machine - db1.stateu.edu except those whose name includes the - string temp. -
% vos backupsys -server db1.stateu.edu -prefix '^.*temp' - --
The following example creates a backup version of every volume listed in - the cell's VLDB, excluding those whose names contain the string - source, but including those whose names contain the string - source.current. -
% vos backupsys -prefix '^.*source' -exclude -xprefix '^.*source\.current' - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
UNIX manual page for regexp(5) -
-
- -
-
-
Purpose -
Changes or removes a file server machine's entry in the VLDB -
Synopsis -
vos changeaddr -oldaddr <original IP address> [-newaddr <new IP address>] - [-remove] [-cell <cell name>] [-noauth] [-localauth] - [-verbose] [-help] - - vos ch -o <original IP address> [-ne <new IP address>] [-r] - [-c <cell name>] [-no] [-l] [-v] [-h] --
Description -
The vos changeaddr command removes a server entry from the - Volume Location Database (VLDB) when the -remove flag is combined - with the -oldaddr argument. There must be no VLDB entries - that list the machine as a site for any version of a volume (if necessary, use - the vos move or vos remove command to more or remove - volumes). It is appropriate to remove a VLDB server entry when removing - the corresponding file server machine from service; this is the only - recommended use of the command. -
To display all VLDB server entries, use the vos listaddrs - command. -
Cautions -
Combining the command's -oldaddr and -newaddr - arguments is no longer the appropriate way to change the IP address registered - for a file server machine. Furthermore, if a machine is multihomed and - its server entry includes several addresses, then the address specified with - the -newaddr argument replaces all of the addresses currently - listed in the server entry that includes the address specified by the - -oldaddr argument. This effectively makes the machine - single-homed with respect to AFS operations, which is probably not the desired - result. -
The recommended method for changing the IP addresses in a server entry is - instead to restart the fs process group (which includes the File - Server) after using the utilities provided by the operating system to - reconfigure the machine's network interfaces. For a description of - how the File Server constructs and registers a list of its network interfaces - in the VLDB, see the reference page for the sysid file. -
If, counter to recommended usage, the command is used to change the IP - address in a server entry, it does not also change the names of machine - entries in the Protection Database. Operations fail when they refer to - a protection group that has an obsolete IP address in it. Use the - pts rename command to change the names of machine entries that - correspond to the addresses changed with this command. Changing the - address of a database server machine also requires updating the client and - server versions of the CellServDB file on every machine. -
Options -
Examples -
The following command removes the VLDB server entry that includes the IP - address 192.12.107.214. -
% vos changeaddr -oldaddr 192.12.107.214 -remove - --
Privilege Required -
Issuer must be listed in the /usr/afs/etc/UserList file on the - machine specified with the -oldaddr argument and on each database - server machine. -
Related Information -
UserList -
sysid -
vos -
-
- -
-
-
Purpose -
Creates a read/write volume and associated VLDB entry -
Synopsis -
vos create -server <machine name> -partition <partition name> - -name <volume name> [-maxquota <initial quota (KB)>] - [-cell <cell name>] [-noauth] [-localauth] [-verbose] [-help] - - vos cr -s <machine name> -p <partition name> -na <volume name> - [-m <initial quota (KB)>] [-c <cell name>] [-no] [-l] [-v] [-h] --
Description -
The vos create command creates a read/write volume with the name - specified by the -name argument at the site specified by the - -server and -partition arguments. In addition, - the command allocates or sets the following: -
The volume is empty when created. To access it via the Cache - Manager, mount it in the file space by using the fs mkmount - command. -
Options -
Output -
The Volume Server produces the following message to confirm that it created - the volume: -
Volume volume_ID created on partition partition_name of machine_name - --
Examples -
The following command creates the read/write volume - user.pat on the /vicepf partition of the file - server machine fs4.abc.com. -
% vos create -server fs4.abc.com -partition /vicepf -name user.pat - Volume user.pat created on partition /vicepf of fs4.abc.com - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
-
- -
-
-
Purpose -
Removes a volume entry from the VLDB. -
Synopsis -
vos delentry [-id <volume name or ID>+] - [-prefix <prefix of volume whose VLDB entry is to be deleted>] - [-server <machine name>] [-partition <partition name>] - [-cell <cell name>] [-noauth] [-localauth] [-verbose] [-help] - - vos de [-i <volume name or ID>+] - [-pr <prefix of volume whose VLDB entry is to be deleted>] - [-s <machine name>] [-pa <partition name>] [-c <cell name>] - [-n] [-l] [-v] [-h] --
Description -
The vos delentry command removes the Volume Location Database - (VLDB) entry for each specified volume. A specified volume can be any - of the three types (read/write, read-only, or backup), but the entire entry is - removed no matter which type is provided. The command has no effect on - the actual volumes on file server machines, if they exist. -
This command is useful if a volume removal operation did not update the - VLDB (perhaps because the vos zap command was used), but the system - administrator does not feel it is necessary to use the vos syncserv - and vos syncvldb commands to synchronize an entire file server - machine. -
To remove the VLDB entry for a single volume, use the -id - argument. To remove groups of volumes, combine the -prefix, - -server, and -partition arguments. The following - list describes how to remove the VLDB entry for the indicated group of - volumes: -
Cautions -
Do not use this command to remove a volume in normal circumstances; it - does not remove a volume from the file server machine, and so is likely to - make the VLDB inconsistent with state of the volumes on server - machines. Use the vos remove command to remove both the - volume and its VLDB entry. -
Options -
Combine this argument with the -prefix argument, the - -partition argument, or both. -
Combine this argument with the -prefix argument, the - -server argument, or both. -
Output -
The following message confirms the success of the command by indicating how - many VLDB entries were removed. -
Deleted number VLDB entries - --
Examples -
The following command removes the VLDB entry for the volume - user.temp. -
% vos delentry user.temp - --
The following command removes the VLDB entry for every volume whose name - begins with the string test and for which the VLDB lists a site on - the file server machine fs3.abc.com. -
% vos delentry -prefix test -server fs3.abc.com - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
vos zap -
-
- -
-
-
Purpose -
Converts a volume into ASCII format and writes it to a file -
Synopsis -
vos dump -id <volume name or ID> [-time <dump from time>] [-file <dump file>] - [-server <server>] [-partition <partition>] [-cell <cell name>] - [-noauth] [-localauth] [-verbose] [-help] - - vos du -i <volume name or ID> [-t <dump from time>] [-f <dump file>] - [-s <server>] [-p <partition>] [-c <cell name>] - [-n] [-l] [-v] [-h] --
Description -
The vos dump command converts the contents of the indicated - volume, which can be read/write, read-only or backup, into ASCII - format. The Volume Server writes the converted contents to the file - named by the -file argument, or to the standard output - stream. In the latter case, the output can be directed to a named pipe, - which enables interoperation with third-party backup utilities. -
To dump the complete contents of a volume (create a full dump), - omit the -time argument or specify the value 0 (zero) - for it. To create an incremental dump, which includes only - the files and directories in the volume that have modification timestamps - later than a certain time, specify a date and time as the value for the - -time argument. -
By default, the vos command interpreter consults the Volume - Location Database (VLDB) to learn the volume's location, so the - -server and -partition arguments are not - required. If the -id argument identifies a read-only volume - that resides at multiple sites, the command dumps the version from just one of - them (normally, the one listed first in the volume's VLDB entry as - reported by the vos examine or vos listvldb - command). To dump the read-only volume from a particular site, use the - -server and -partition arguments to specify the - site. To bypass the VLDB lookup entirely, provide a volume ID number - (rather than a volume name) as the value for the -id argument, - together with the -server and -partition - arguments. This makes it possible to dump a volume for which there is - no VLDB entry. -
During the dump operation, the volume is inaccessible both to Cache - Managers and to other volume operations. Dumping a volume does not - otherwise affect its status on the partition or its VLDB entry. -
To restore a dumped volume back into AFS, use the vos restore - command. -
Cautions -
Support for incremental dumps is provided to facilitate interoperation with - third-party backup utilities. The vos dump command does not - provide any of the administrative facilities of an actual backup system, so - the administrator must keep manual records of dump times and the relationship - between full and incremental dumps of a volume. For a volume's - contents to be consistent after restoration of incremental dumps, there must - be no gap between the time at which a prior dump of the volume was created and - the value of the -time argument to the vos dump command - that creates the incremental dump. More specifically, for a read/write - volume, the -time argument must specify the time that the prior - dump was performed, and for a read-only or backup volume it must specify the - time that the volume was last released (using the vos release - command) or cloned (using the vos backup or vos - backupsys command) prior to dumping it. The parent dump can be - either a full dump or another incremental dump. -
Options -
Examples -
The following command writes a full dump of the volume - user.terry to the file - /afs/abc.com/common/dumps/terry.dump. -
% vos dump -id user.terry -time 0 -file /afs/abc.com/common/dumps/terry.dump - --
The following command writes an incremental dump of the volume - user.smith to the file - smith.990131.dump in the current working - directory. Only those files in the volume with modification time stamps - later than 6:00 p.m. on 31 January 1999 are included in - the dump. -
% vos dump -id user.smith -time "01/31/1999 18:00" -file smith.990131.dump - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
If the -file argument is included, the issuer must also have - permission to insert and write in the directory that houses the file. -
Related Information -
vos -
-
- -
-
-
Purpose -
Displays information from the volume header and VLDB entry for a - volume. -
Synopsis -
vos examine -id <volume name or ID> [-extended] [-cell <cell name>] - [-noauth] [-localauth] [-verbose] [-help] - - vos e -i <volume name or ID> [-e] [-c <cell name>] [-n] [-l] [-v] [-h] - - vos volinfo -i <volume name or ID> [-e] [-c <cell name>] - [-n] [-l] [-v] [-h] - - vos v -i <volume name or ID> [-e] [-c <cell name>] [-n] [-l] [-v] [-h] - --
Description -
The vos examine command formats and displays information from - the Volume Location Database (VLDB) entry and the volume header of the volume - specified by the -id argument. -
To display the volume header only, use the vos listvol - command. To display information from the VLDB only, use the vos - listvldb command. -
Options -
Output -
The first seven lines of the output show information from the volume header - and the remaining lines come from the VLDB. Each item in the following - list corresponds to a line of output derived from the volume header. -
When the -extended flag is included, two tables appear - next: -
If the following message appears instead of the previously listed - information, it indicates that a volume is not accessible to Cache Managers or - the vos command interpreter, for example because a clone is being - created. -
**** Volume volume_ID is busy **** --
If the following message appears instead of the previously listed - information, it indicates that the File Server is unable to attach the volume, - perhaps because it is seriously corrupted. The FileLog and - VolserLog log files in the /usr/afs/logs directory on - the file server machine possibly provide additional information; use the - bos getlog command to display them. -
**** Could not attach volume volume_ID **** --
Following a blank line, information from the VLDB entry appears. - Each item in this list corresponds to a separate line in the output: -
For further discussion of the New release and Old - release flags, see the reference page for the vos release - command. -
Examples -
The following example shows output for the ABC Corporation volume called - usr with two read-only replication sites (this volume is mounted at - the /afs/abc.com/usr directory). For the sake of - illustration, the output shows the volume as locked. -
% vos examine usr - usr 536870981 RW 3459 K On-line - fs2.abc.com /vicepb - RWrite 5360870981 ROnly 536870982 Backup 536870983 - MaxQuota 40000 K - Creation Mon Jun 12 15:22:06 1989 - Last Update Fri Jun 16 09:34:35 1989 - 5719 accesses in the past day (i.e., vnode references) - RWrite: 5360870981 ROnly: 536870982 Backup: 536870983 - number of sites -> 3 - server fs1.abc.com partition /vicepa RO Site - server fs3.abc.com partition /vicepa RO Site - server fs2.abc.com partition /vicepb RW Site - Volume is currently LOCKED - --
The following example shows the output for the volume - user.terry using the -extended flag. The - volume has no read-only replication sites. -
% vos examine -id user.terry -extended - user.terry 354287190 RW 2302 K used 119 files On-line - fs4.abc.com /vicepc - RWrite 354287190 ROnly 0 Backup 354287192 - MaxQuota 5000 K - Creation Wed Nov 25 17:38:57 1992 - Last Update Tue Dec 15 10:46:20 1992 - 598 accesses in the past day (i.e., vnode references) - Raw Read/Write Stats - |-------------------------------------------| - | Same Network | Diff Network | - |----------|----------|----------|----------| - | Total | Auth | Total | Auth | - |----------|----------|----------|----------| - Reads | 55 | 55 | 38 | 38 | - Writes | 95 | 95 | 0 | 0 | - |-------------------------------------------| - Writes Affecting Authorship - |-------------------------------------------| - | File Authorship | Directory Authorship| - |----------|----------|----------|----------| - | Same | Diff | Same | Diff | - |----------|----------|----------|----------| - 0-60 sec | 38 | 0 | 21 | 1 | - 1-10 min | 2 | 0 | 7 | 0 | - 10min-1hr | 0 | 0 | 1 | 0 | - 1hr-1day | 1 | 0 | 5 | 1 | - 1day-1wk | 0 | 0 | 0 | 0 | - > 1wk | 0 | 0 | 0 | 0 | - |-------------------------------------------| - RWrite: 354287190 Backup: 354287192 - number of sites -> 1 - server fs4.abc.com partition /vicepc RW Site - --
Privilege Required -
None -
Related Information -
salvager -
vos -
-
- -
-
-
Purpose -
Displays the syntax of specified vos commands or functional - descriptions for all vos commands -
Synopsis -
vos help [-topic <help string>+] [-help] - - vos h [-t <help string>+] [-h] --
Description -
The vos help command displays the complete online help entry - (short description and syntax statement) for each command operation code - specified by the -topic argument. If the -topic - argument is omitted, the output includes the first line (name and short - description) of the online help entry for every vos command. -
To list every vos command whose name or short description - includes a specified keyword, use the vos apropos command. -
Options -
Output -
The online help entry for each vos command consists of the - following two or three lines: -
Examples -
The following command displays the online help entry for the vos - create command: -
% vos help create - vos create: create a new volume - Usage: vos create -server <machine name> -partition <partition name> - -name <volume name> [-cell <cell name>] [-noauth] [-localauth] - [-verbose] [-help] - --
Privilege Required -
None -
Related Information -
vos -
-
- -
-
-
Purpose -
Displays all VLDB server entries -
Synopsis -
vos listaddrs [-cell <cell name>] [-noauth] - [-localauth] [-verbose] [-help] - - vos lista [-c <cell name>] [-n] [-l] [-v] [-h] --
Description -
The vos listaddrs command displays all of the server entries - from the Volume Location Database (VLDB). An entry is created as the - File Server initializes and registers the contents of its - /usr/afs/local/sysid file in the VLDB. -
Options -
Output -
The output displays all server entries from the VLDB, each on its own - line. If a file server machine is multihomed, all of its registered - addresses appear on the line. The first one is the one reported as a - volume's site in the output from the vos examine and vos - listvldb commands. -
The VLDB records IP addresses, and the command interpreter has the local - name service (either a process like the Domain Name Service or a local host - table) translate them to hostnames before displaying them. If an IP - address appears in the output, it is not possible to translate it. -
The existence of an entry does not necessarily indicate that the machine - that is still an active file server machine. To remove obsolete server - entries, use the vos changeaddr command with the -remove - argument. -
Examples -
The following command displays the VLDB server entries in the ABC - Corporation cell: -
% vos listaddrs - sv5.abc.com - sv1.abc.com - sv2.abc.com afs2.abc.com - sv6.abc.com - --
Privilege Required -
None -
Related Information -
sysid -
vos -
-
- -
-
-
Purpose -
Displays all AFS partitions on a file server machine -
Synopsis -
vos listpart -server <machine name> [-cell <cell name>] [-noauth] - [-localauth] [-verbose] [-help] - - vos listp -s <machine name> [-c <cell name>] [-n] [-l] [-v] [-h] --
Description -
The vos listpart command displays all of the valid AFS - partitions on the indicated file server machine, without consulting the Volume - Location Database (VLDB). The vos partinfo command reports - the size of a partition and the available space on that partition. -
Options -
Output -
The output consists of a list of partition names of the form - /vicepxx, following the header: -
The partitions on the server are: - --
The last line of the output reports the total number of partitions. -
Examples -
The following command displays the partitions on - fs1.abc.com: -
% vos listpart fs1.abc.com - The partitions on the server are: - /vicepa /vicepb /vicepc /vicepd - Total: 4 - --
Privilege Required -
None -
Related Information -
vos -
-
- -
-
-
Purpose -
Displays a volume's VLDB entry -
Synopsis -
vos listvldb [-name <volume name or ID>] [-server <machine name>] - [-partition <partition name>] [-locked] [-quiet] [-nosort] - [-cell <cell name>] [-noauth] [-localauth] [-verbose] [-help] - - vos listvl [-na <volume name or ID>] [-s <machine name>] - [-p <partition name>] [-lock] [-q] [-nos] [-c <cell name>] - [-noa] [-loca] [-v] [-h] --
Description -
The vos listvldb command formats and displays information from - the Volume Location Database (VLDB) entry for each volume specified. - The output depends on the combination of options supplied on the command - line. Combine options as indicated to display the desired type of VLDB - entries: -
Options -
This argument can be combined with the -partition argument, the - -locked flag, or both. -
This argument can be combined with the -server argument, the - -locked flag, or both. -
Output -
If the output includes more than one VLDB entry, by default the first line - reports which file server machine, partition, or both, houses the - volumes. The final line of output reports the total number of entries - displayed. Including the -quiet flag suppresses these - lines. -
By default, volumes are sorted alphabetically by volume name. - Including the -nosort flag skips the sorting step, which can speed - up the production of output if there are a large number of entries. -
The VLDB entry for each volume includes the following information: -
For further discussion of the New release and Old - release flags, see the reference page for the vos release - command. -
Examples -
The following command displays VLDB information for the ABC Corporation - volume called usr, which has two read-only replication sites: -
% vos listvldb -name usr - usr - RWrite: 5360870981 ROnly: 536870982 Backup: 536870983 - number of sites -> 3 - server fs1.abc.com partition /vicepa RO Site - server fs3.abc.com partition /vicepa RO Site - server fs2.abc.com partition /vicepb RW Site - --
The following example shows entries for two of the volumes that reside on - the file server machine fs4.abc.com. The first - VLDB entry is currently locked. There are 508 entries that mention the - machine as a volume site. -
% vos listvldb -server fs4.abc.com - VLDB entries for server fs4.abc.com - . . . . - . . . . - user.smith - RWrite: 278541326 ROnly: 278541327 Backup: 278542328 - number of sites -> 1 - server fs4.abc.com partition /vicepg RW Site - Volume is currently LOCKED - user.terry - RWrite 354287190 ROnly 354287191 Backup 354287192 - number of sites -> 1 - server fs4.abc.com partition /vicepc RW Site - . . . . - . . . . - Total entries: 508 - --
Privilege Required -
None -
Related Information -
vos -
vos lock -
-
- -
-
-
Purpose -
Displays information from a volume header -
Synopsis -
vos listvol -server <machine name> [-partition <partition name>] - [-fast] [-long] [-quiet] [-extended] [-cell <cell name>] - [-noauth] [-localauth] [-verbose] [-help] - - vos listvo -s <machine name> [-p <partition name>] [-f] [-lon] - [-q] [-e] [-c <cell name>] [-n] [-loc] [-v] [-h] --
Description -
The vos listvol command formats and displays the following - information from the volume header of each specified volume: volume - name, volume ID, volume type, size, and status at the server. The - actual information displayed depends on the combination of arguments supplied - when the command is issued. To display volume header information for - various numbers of volumes, combine the command's arguments as - indicated: -
To display the Volume Location Database (VLDB) entry for one or more - volumes, use the vos listvldb command. To display both the - VLDB entry and the volume header for a single volume, use the vos - examine command. -
Options -
This argument can be combined with the -partition argument, as - well as the -fast, -long, or -extended - flag. -
Output -
The output is ordered alphabetically by volume name and by default provides - the following information on a single line for each volume: -
If the following message appears instead of the previously listed - information, it indicates that a volume is not accessible to Cache Managers or - the vos command interpreter, for example because a clone is being - created. -
**** Volume volume_ID is busy **** --
If the following message appears instead of the previously listed - information, it indicates that the File Server is unable to attach the volume, - perhaps because it is seriously corrupted. The FileLog and - VolserLog log files in the /usr/afs/logs directory on - the file server machine possibly provide additional information; use the - bos getlog command to display them. -
**** Could not attach volume volume_ID **** --
The information about individual volumes is bracketed by summary - lines. The first line of output specifies the number of volumes in the - listing. The last line of output summarizes the number of volumes that - are online, offline, and busy. These lines do not appear if the - -quiet flag is used. -
If the -fast flag is added, the output displays only the volume - ID number of each volume, arranged in increasing numerical order. The - final line (which summarizes the number of online, offline, and busy volumes) - is omitted. -
If the -long flag is included, the output for each volume - includes all of the information in the default listing plus the - following. Each item in this list corresponds to a separate line of - output: -
If the -extended flag is included, the output for each volume - includes all of the information reported with the -long flag, plus - two tables of statistics: -
Examples -
The following example shows the output for the /vicepb partition - on the file server machine fs2.abc.com when no flags - are provided: -
% vos listvol -server fs2.abc.com -partition b - Total number of volumes on server fs2.abc.com \ - partition /vicepb : 66 - sys 1969534847 RW 1582 K On-line - sys.backup 1969535105 BK 1582 K On-line - . . . . . . - . . . . . . - user.pat 1969534536 RW 17518 K On-line - user.pat.backup 1969534538 BK 17537 K On-line - Total volumes onLine 66 ; Total volumes offLine 0 ; Total busy 0 - --
The following example shows the output when the -fast flag is - added: -
% vos listvol -server fs2.abc.com -partition b -fast - Total number of volumes on server fs2.abc.com \ - partition /vicepb : 66 - 1969516782 - 1969516784 - . - . - 1969535796 - --
The following example shows two volumes from the output that appears when - the -long flag is added: -
% vos listvol -server fs2.abc.com -partition b -long - Total number of volumes on server fs2.abc.com \ - partition /vicepb: 66 - . . . . . . - . . . . . . - user.pat 1969534536 RW 17518 K On-line - fs2.abc.com /vicepb - RWrite 1969534536 ROnly 0 Backup 1969534538 - MaxQuota 20000 K - Creation Mon Jun 12 09:02:25 1989 - Last Update Thu May 20 17:39:34 1999 - 1573 accesses in the past day (i.e., vnode references) - user.pat.backup 1969534538 BK 17537 K On-line - fs2.abc.com /vicepb - RWrite 1969534536 ROnly 0 Backup 1969534538 - MaxQuota 20000 K - Creation Tue Jun 13 04:37:59 1989 - Last Update Wed May 19 06:37:59 1999 - 0 accesses in the past day (i.e., vnode references) - . . . . . . - . . . . . . - Total volumes onLine 66 ; Total volumes offLine 0 ; \ - Total busy 0 - --
Privilege Required -
None -
Related Information -
salvager -
vos -
-
- -
-
-
Purpose -
Locks a VLDB volume entry -
Synopsis -
vos lock -id <volume name or ID> [-cell <cell name>] [-noauth] - [-localauth] [-verbose] [-help] - - vos lo -i <volume name or ID> [-c <cell name>] [-n] [-l] [-v] [-h] --
Description -
The vos lock command locks the Volume Location Database (VLDB) - entry for the indicated volume, blocking any operation that requires a write - to that entry. The lock applies to all of the volume versions - associated with the entry, not just the one specified with the -id - argument. -
To unlock a single VLDB entry, use the vos unlock - command. To unlock several entries, or all locked entries in the VLDB, - use the vos unlockvldb command. -
Cautions -
Do not use this command in normal circumstances. It is useful for - guaranteeing that the volume stays unchanged when there is reason to believe - that volume operations cannot properly lock VLDB volume entries as they - normally do to synchronize with one another. -
Options -
Examples -
The following command locks the VLDB entry for - user.terry. -
% vos lock user.terry - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
-
- -
-
-
Purpose -
Moves a read/write volume to another site -
Synopsis -
vos move -id <volume name or ID> -fromserver <machine name on source> - -frompartition <partition name on source> - -toserver <machine name on destination> - -topartition <partition name on destination> - [-cell <cell name>] [-noauth] [-localauth] [-verbose] [-help] - - vos m -i <volume name or ID> -froms <machine name on source> - -fromp <partition name on source> -tos <machine name on destination> - -top <partition name on destination> [-c <cell name>] - [-n] [-l] [-v] [-h] --
Description -
The vos move command moves the indicated read/write volume from - its current site (specified with the -fromserver and - -frompartition arguments) to the destination site (specified with - the -toserver and -topartition arguments). This - command automatically removes the backup copy from the current site, if it - exists. To create a new backup volume at the destination site, use the - vos backup command. -
This command works on read/write volumes only. To move a read-only - volume, use the vos addsite and vos release commands to - define a new read-only site and release the volume contents to it, and then - use the vos remove command to remove the previous read-only - volume's definition from the Volume Location Database (VLDB) and data - from the partition. To move a backup volume, use this command to move - its read/write source and then issue the vos backup command. -
Before executing this command, the vos command interpreter - initiates a check that the destination partition contains enough space to - house the volume being moved. If there is not enough space, the move - operation is not attempted and the following message appears: -
vos: no space on target partition dest_part to move volume volume - --
Cautions -
Unless there is a compelling reason, do not interrupt a vos move - command in progress. Interrupting a move can result in one or more of - the following inconsistent states: -
If the <Ctrl-c> interrupt signal is pressed while a vos - move operation is executing, the following message warns of the - consequences and requests confirmation of the kill signal: -
SIGINT handler: vos move operation in progress - WARNING: may leave AFS storage and metadata in indeterminate state - enter second control-c to exit - --
To confirm termination of the operation, press <Ctrl-c> a - second time; press any other key to continue the operation. -
Options -
Examples -
The following example moves the volume user.smith from - the /vicepb partition on the file server machine - fs3.abc.com to the /vicepg partition on - the file server machine fs7.abc.com. -
% vos move -id user.smith -fromserver fs3.abc.com -frompartition b \ - -toserver fs7.abc.com -topartition g - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machines specified with the -toserver and - -fromserver arguments and on each database server machine. - If the -localauth flag is included, the issuer must instead be - logged on to a server machine as the local superuser root. -
Related Information -
vos -
-
- -
-
-
Purpose -
Reports the available and total space on a partition -
Synopsis -
vos partinfo -server <machine name> [-partition <partition name>] - [-cell <cell name>] [-noauth] [-localauth] [-verbose] [-help] - - vos p -s <machine name> [-p <partition name>] [-c <cell name>] - [-n] [-l] [-v] [-h] --
Description -
The vos partinfo command reports the amount of space available - and total size on either all of the partitions on the indicated - file server machine (if the -partition argument is omitted) - or the specified partition on that file server machine. The - Volume Location Database (VLDB) is not consulted. -
Options -
Cautions -
The partition-related statistics in this command's output do not - always agree with the corresponding values in the output of the standard UNIX - df command. The statistics reported by this command can be - up to five minutes old, because the Cache Manager polls the File Server for - partition information at that frequency. Also, on some operating - systems, the df command's report of partition size includes - reserved space not included in this command's calculation, and so is - likely to be about 10% larger. -
Output -
The output reports the amount of space available and total space for each - specified partition. -
Examples -
The following command displays all partitions on the file server machine - fs2.abc.com. -
% vos partinfo fs2.abc.com - Free space on partition /vicepa: 27301 K blocks out of total 549197 - Free space on partition /vicepb: 13646 K blocks out of total 69194 - Free space on partition /vicepc: 31798 K blocks out of total 320315 - Free space on partition /vicepd: 33302 K blocks out of total 494954 - --
Privilege Required -
None -
Related Information -
vos -
-
- -
-
-
Purpose -
Updates the contents of read-only volumes to match their read/write source - volume -
Synopsis -
vos release -id <volume name or ID> [-f] [-cell <cell name>] - [-noauth] [-localauth] [-verbose] [-help] - - vos rel -i <volume name or ID> [-f] [-c <cell name>] [-n] [-l] [-v] [-h] --
Description -
The vos release command copies the contents of the indicated - read/write source volume to each read-only site defined in the source - volume's Volume Location Database (VLDB) entry. (Use the vos - addsite command to define sites as necessary before issuing this - command). Each read-only copy has the same name as read/write source - with the addition of a .readonly extension. -
For users to have a consistent view of the file system, the release of the - new volume version must be atomic: either all read-only sites receive - the new version, or all sites keep the version they currently have. The - vos release command is designed to ensure that all copies of the - volume's read-only version match both the read/write source and each - other. In cases where problems such as machine or server process - outages prevent successful completion of the release operation, AFS uses two - mechanisms to alert the administrator. -
First, the command interpreter generates an error message on the standard - error stream naming each read-only site that did not receive the new volume - version. Second, during the release operation the Volume Location (VL) - Server marks site definitions in the VLDB entry with flags (New - release and Old release) that indicate whether or not the - site has the new volume version. If any flags remain after the - operation completes, it was not successful. The Cache Manager refuses - to access a read-only site marked with the Old release flag, which - potentially imposes a greater load on the sites marked with the New - release flag. It is important to investigate and eliminate the - cause of the failure and then to issue the vos release command as - many times as necessary to complete the release without errors. -
The pattern of site flags remaining in the volume's VLDB entry after a - failed release operation can help determine the point at which the operation - failed. Use the vos examine or vos listvldb - command to display the VLDB entry. The VL Server sets the flags in - concert with the Volume Server's operations, as follows: -
By default, the Volume Server determines automatically whether or not it - needs to create a new ReleaseClone: -
To override the default behavior, forcing the Volume Server to create and - release a new ReleaseClone to the read-only sites, include the -f - flag. This is appropriate if, for example, the data at the read/write - site has changed since the existing ReleaseClone was created during the - previous release operation. -
Options -
Examples -
The following command clones the read/write volume usr and - releases it to the read-only sites defined in its VLDB entry. -
% vos release usr - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
-
- -
-
-
Purpose -
Removes a volume from a site -
Synopsis -
vos remove [-server <machine name>] [-partition <partition name>] - -id <volume name or ID> [-cell <cell name>] - [-noauth] [-localauth] [-verbose] [-help] - - vos remo [-s <machine name>] [-p <partition name>] -i <volume name or ID> - [-c <cell name>] [-n] [-l] [-v] [-h] --
Description -
The vos remove command removes the indicated volume from the - partition on which it resides. The Volume Location Database (VLDB) - record is altered appropriately, as described in the following - paragraphs. Use this command to remove any of the three types of - volumes; the effect depends on the type. -
This command is the most appropriate one for removing volumes in almost all - cases. Other commands that remove only volumes or only VLDB entries - (such as the vos delentry, vos remsite and vos - zap commands) by definition can put the volumes and VLDB out of - sync. Use them only in the special circumstances mentioned on their - reference pages. Like the vos delentry command, this command - can remove a VLDB entry when no corresponding volumes exist on the file server - machine. Like the vos zap command, this command can remove a - volume that does not have a VLDB entry, as long as the volume is online, - -server and -partition arguments are provided, and the - -id argument specifies the volume's ID number. -
Options -
Including this argument is necessary only when the -id argument - names a read-only volume that exists at multiple sites. Provide the - -server argument along with this one. -
Note: | If the -server and -partition arguments are omitted, - the -id switch must be provided. - |
Examples -
The following example removes the read/write volume - user.terry and its backup version, if any. -
% vos remove -id user.terry - --
The following example removes the read-only volume - root.afs.readonly from one of its sites, the - /vicepa partition on the file server machine - fs1.abc.com. -
% vos remove fs1.abc.com a root.afs.readonly - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
vos zap -
-
- -
-
-
Purpose -
Removes a read-only site definition from a VLDB entry -
Synopsis -
vos remsite -server <machine name> -partition <partition name> - -id <volume name or ID> [-cell <cell name>] [-noauth] - [-localauth] [-verbose] [-help] - - vos rems -s <machine name> -p <partition name> -i <volume name or ID> - [-c <cell name>] [-n] [-l] [-v] [-h] --
Description -
The vos remsite command removes the read-only replication site - specified by the -machine and -partition arguments from - the Volume Location Database (VLDB) entry for the indicated volume, which is - read/write. -
This command is useful for removing read-only sites that were mistakenly - created with the vos addsite command, before the vos - release command actually releases them. If a read-only copy - already exists at the site, it is not affected. However, if this - read-only site was the last site housing any version of the volume, then the - entire VLDB entry is removed, even if a copy of the read-only version still - actually exists at the site. The VL Server does not correct the - discrepancy until the vos syncserv and vos syncvldb - commands are run. -
Cautions -
Do not use this command as the standard way to remove a read-only volume, - because it can create a discrepancy between the VLDB and the volumes on file - server machines. Use the vos remove command instead. -
Options -
Examples -
The following command removes the mistakenly defined read-only site - /viceph on the file server machine - fs5.abc.com from the VLDB entry for the volume - root.cell. -
% vos remsite -server fs5.abc.com -partition h -id root.cell - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
vos zap -
-
- -
-
-
Purpose -
Renames a volume -
Synopsis -
vos rename -oldname <old volume name> -newname <new volume name> - [-cell <cell name>] [-noauth] [-localauth] [-verbose] [-help] - - vos ren -o <old volume name> -ne <new volume name> [-c <cell name>] - [-no] [-l] [-v] [-h] --
Description -
The vos rename command changes the name of the read/write volume - specified with the -oldname argument to the name specified with the - -newname argument. The names of the read/write's - read-only copies and backup copy, if any, change automatically to - match. -
After issuing this command, remember to correct any mount points that refer - to the old volume name, by removing the old mount point with the fs - rmmount command and creating a new one with the fs mkmount - command. -
Options -
Output -
The vos rename command produces no output if the command - succeeds. -
If the volume named by the -oldname argument does not exist, the - following message appears: -
vos: Could not find entry for volume old volume name. - --
Examples -
The following example changes the mistaken volume name - sun4x_56.afsws to the correct alternative - sun4x_56.usr.afsws. -
% vos rename -oldname sun4x_56.afsws -newname sun4x_56.usr.afsws - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
-
- -
-
-
Purpose -
Converts an ASCII file into proper volume format and writes it to the file - system -
Synopsis -
vos restore -server <machine name> -partition <partition name> - -name <name of volume to be restored> [-file <dump file>] - [-id <volume ID>] [-overwrite <abort | full | incremental>] - [-cell <cell name>] [-noauth] [-localauth] [-verbose] - [-help] - - vos res -s <machine name> -p <partition name> - -na <name of volume to be restored> [-f <dump file>] - [-i <volume ID>] [-o <a | f | inc>] [-c <cell name>] - [-no] [-l] [-v] [-h] --
Description -
The vos restore command converts a volume dump file previously - created with the vos dump command from ASCII into the volume format - appropriate for the machine type indicated by the -server argument, - and restores it as a read/write volume to the partition named by the - -partition argument on that machine. The Volume Server - assigns the volume name indicated with the -name argument, and - resets the volume's creation timestamp to the time at which the restore - operation begins (the creation timestamp is stored in the volume header and - reported in the Creation field in the output from the vos - examine and vos listvol commands.) -
Use the -file argument to name the dump file, or omit the - argument to provide the file via the standard input stream, presumably through - a pipe. The pipe can be named, which enables interoperation with - third-party backup utilities. -
As described in the following list, the command can create a completely new - volume or overwrite an existing volume. In all cases, the full dump of - the volume must be restored before any incremental dumps. If there are - multiple incremental dump files, they must be restored in the order they were - created. -
If the volume named by the -name argument already exists and the - -overwrite argument is omitted, the command interpreter produces - the following prompt: -
-
Do you want to do a full/incremental restore or abort? [fia](a): - --
Respond by entering one of the following values: -
Cautions -
If the -file argument is omitted, the issuer must provide all - other necessary arguments, because the standard input stream is unavailable - for responding to the command interpreter's prompts for missing - information. In particular, the issuer must provide the - -overwrite argument if overwriting an existing volume. -
Options -
-
This argument is mandatory if the -file argument is not - provided. -
Examples -
The following command restores the contents of the dump file - /afs/abc.com/common/dumps/terry.dump to the - /vicepc partition on the file server machine - fs3.abc.com. The restored volume is named - user.terry. -
% cd /afs/abc.com/common/dumps - - % vos restore -file terry.dump -server fs3.abc.com -partition c \ - -name user.terry - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
vos dump -
-
- -
-
-
Purpose -
Reports a Volume Server's status -
Synopsis -
vos status -server <machine name> [-cell <cell name>] [-noauth] - [-localauth] [-verbose] [-help] - - vos st -s <machine name> [-c <cell name>] [-n] [-l] [-v] [-h] --
Description -
The vos status command reports on what the Volume Server on a - certain file server machine is doing at the moment the command is - issued. If there is no activity, the following message appears: -
No active transactions on machine_name - --
This command is useful mainly if there is concern that the Volume Server is - not performing requested actions. -
Options -
Output -
There are two possible types of output. -
The following message indicates that the Volume Server is not currently - performing any actions. -
No active transactions on machine name - --
The other possible output is a set of information which is probably more - useful to programmers than to system administrators. A full - understanding of all the fields requires familiarity with the code for the - Volume Server, as many of the fields report ID numbers and flag values that - the Volume Server sets for internal use. -
Among the fields of possible interest to an administrator are: -
A fourth line can appear during certain transactions, and includes the - following fields: -
The lastReceiveTime and lastSendTime are for internal - use. -
Examples -
The following example illustrates the kind of output that sometimes appears - when the Volume Server on fs1.abc.com is executing a - dump at the time this command is issued. -
% vos status fs1.abc.com - -------------------------------------------- - transaction: 575 created: Tue Jan 2 8:34:56 1990 - attachFlags: offline - volume: 536871080 partition: /vicepb procedure: Dump - packetRead: 2 lastReceiveTime: 113313 packetSend: 24588 - lastSendTime: 113317 - -------------------------------------------- - --
Privilege Required -
None -
Related Information -
vos -
-
- -
-
-
Purpose -
Verifies VLDB entries that mention a specified site -
Synopsis -
vos syncserv -server <machine name> [-partition <partition name>] - [-cell <cell name>] [-noauth] [-localauth] - [-verbose] [-help] - - vos syncs -s <machine name> [-p <partition name>] - [-c <cell name>] [-n] [-l] [-v] [-h] --
Description -
The vos syncserv command verifies that each volume mentioned in - a VLDB entry actually exists at the site indicated in the entry. It - checks all VLDB entries that mention a read/write, read-only, or backup site - either on any partition on the file server machine specified by the - -server argument, or on the one partition specified by the - -server and -partition arguments. Note that the - command can end up inspecting sites other than those specified by the - -server and -partition arguments, if there are versions - of the volume at sites other than the one specified. -
The command alters any incorrect information in the VLDB, unless there is - an irreconcilable conflict with other VLDB entries. In that case, it - writes a message to the standard error stream instead. The command - never removes volumes from file server machines. -
To achieve complete VLDB consistency, first run the vos syncvldb - command on all file server machines in the cell, then run this command on all - file server machines in the cell. -
Options -
Examples -
The following example verifies the VLDB entries in which a site definition - mentions the file server machine fs3.abc.com. -
% vos syncserv -server fs3.abc.com - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
-
- -
-
-
Purpose -
Verifies VLDB entries for volumes residing at specified site -
Synopsis -
vos syncvldb [-server <machine name>] [-partition <partition name>] - [-volume <volume name or ID>] [-cell <cell name>] [-noauth] - [-localauth] [-verbose] [-help] - - vos syncv [-s <machine name>] [-p <partition name>] [-vo <volume name or ID>] - [-c <cell name>] [-n] [-l] [-ve] [-h] --
Description -
The vos syncvldb command verifies that the status of the volumes - housed either on all partitions on the file server machine specified by the - -server argument, or on the single partition specified by the - -server and -partition arguments, is recorded correctly - in the VLDB. If the -volume argument is included to indicate - a single volume, the command compares only its status on the file server - machine with its VLDB entry. -
If the -volume argument is not included, the command interpreter - obtains from the Volume Server a list of the volumes that reside on each - partition, then changes information in the VLDB as necessary to reflect their - state on the partition. For example, it creates or updates a VLDB entry - when it finds a volume for which the VLDB entry is missing or - incomplete. However, if there is already a VLDB entry that defines a - different location for the volume, or there are irreconcilable conflicts with - other VLDB entries, it instead writes a message about the conflict to the - standard error stream. The command never removes volumes from the file - server machine. -
To achieve complete VLDB consistency, run this command on all file server - machines in the cell, and then run the vos syncserv command on all - file server machines in the cell. -
Using the -volume argument basically combines the effects of - this command with those of the vos syncserv command, for a single - volume. The command not only verifies that the VLDB entry is correct - for the specified volume type (read/write, backup, or read-only), but also - checks that any related volume types mentioned in the VLDB entry actually - exist at the site listed in the entry. It is not necessary to provide - the -server argument (and optionally, -partition - argument); if one or both is provided, the results are reliable only if - they specify the actual location of the volume indicated by the - -volume argument. -
Options -
Examples -
The following example command verifies the VLDB entry for each volume - stored on the file server machine fs4.abc.com. -
% vos syncvldb fs4.abc.com - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
-
- -
-
-
Purpose -
Unlocks a single VLDB entry -
Synopsis -
vos unlock -id <volume name or ID> [-cell <cell name>] [-noauth] - [-localauth] [-verbose] [-help] - - vos unlock -i <volume name or ID> [-c <cell name>] [-n] [-l] [-v] [-h] --
Description -
The vos unlock command releases the lock on the Volume Location - Database (VLDB) entry for the indicated volume. -
Cautions -
Do not user this command under normal circumstances. -
It is useful if the VLDB entry is locked but there is no reason to suspect - inconsistency within the volume or between it and the VLDB. Note that - it is possible to list information from locked VLDB entries, even though they - cannot be manipulated in other ways. -
The vos unlockvldb command unlocks several VLDB entries at once, - or even the entire VLDB. The vos lock command locks a VLDB - entry so that no one else can perform an action that requires writing the - VLDB. -
Options -
Examples -
The following example unlocks the VLDB entry for the volume - user.terry. -
% vos unlock user.terry - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
vos lock -
-
- -
-
-
Purpose -
Unlocks several locked VLDB entries -
Synopsis -
vos unlockvldb [-server <machine name>] [-partition <partition name>] - [-cell <cell name>] [-noauth] [-localauth] - [-verbose] [-help] - - vos unlockv [-s <machine name>] [-p <partition name>] - [-c <cell name>] [-n] [-l] [-v] [-h] --
Description -
The vos unlockvldb command releases the lock on the Volume - Location Database (VLDB) entries indicated by the combination of arguments - provided: -
To unlock a single volume, use the vos unlock command - instead. -
Cautions -
Do not use this command under normal circumstances. -
It is useful if VLDB entries for volumes at a certain site are locked but - there is no reason to suspect inconsistency within the volume or between it - and the VLDB. Note that it is possible to list information from locked - VLDB entries, even though they cannot be manipulated in other ways. -
The vos lock command locks a VLDB entry so that no one else can - perform an action that requires writing the VLDB. -
Options -
Examples -
The following command unlocks all locked entries in the VLDB. -
% vos unlockvldb - --
The following command unlocks all locked VLDB entries that mention the - /vicepa partition in a site definition. -
% vos unlockvldb -partition a - --
The following command unlocks all locked VLDB entries that refer to volumes - on the /vicepc partition of the file server machine - fs3.abc.com. -
% vos unlockvldb -server fs3.abc.com -partition c - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
vos lock -
-
- -
-
-
Purpose -
Removes a volume from its site without writing to the VLDB -
Synopsis -
vos zap -server <machine name> -partition <partition name> - -id <volume ID> [-force] [-backup] [-cell <cell name>] - [-noauth] [-localauth] [-verbose] [-help] - - vos z -s <machine name> -p <partition name> -i <volume ID> - [-f] [-b] [-c <cell name>] [-n] [-l] [-v] [-h] --
Description -
The vos zap command removes the volume with the specified - volume ID from the site defined by the -server and - -partition arguments, without attempting to change the - corresponding Volume Location Database (VLDB) entry. If removing the - volume can possibly result in incorrect data in the VLDB, a warning message is - displayed. -
The -force flag removes a volume even if it cannot be "attached" - (brought online), which can happen either because the volume is extremely - damaged or because the Salvager functioned abnormally. Without this - flag, this command cannot remove volumes that are not attachable. See - also the Cautions section. -
To remove the specified read/write volume's backup version at the same - time, include the -backup flag. -
Cautions -
Do not use this command as the standard way to remove a volume, as it is - likely to put the VLDB out of sync with the volumes on servers. Use the - vos remove command instead. -
This command is useful in situations where it is important to delete the - volume, but for some reason the VLDB is unreachable--for example, because - s the Volume Location Server is unavailable. The issuer can remove the - VLDB entry later with the vos remove or vos delentry - command, or it is removed automatically when the vos syncserv and - vos syncvldb commands run. -
To remove a read-only site defined in the VLDB by mistake, before a copy - actually exists at the site, use the vos remsite command. To - remove an entire VLDB entry without affecting volumes at their sites, use the - vos delentry command. -
Do not use the -force flag if the volume is online, but only - when attempts to remove the volume with the vos remove or the - vos zap command have failed, or the volume definitely cannot be - attached. After using the -force flag, make sure that the - volume's VLDB entry is also removed (issue the vos delentry - command if necessary). -
Adding the -force flag makes the command take considerably - longer--about as long as a salvage of the relevant partition--since - the Volume Server examines all inodes on the partition for traces of the - volume. -
Options -
Examples -
The following example removes the volume with volume ID 536870988 from the - /vicepf partition of the file server machine - fs6.abc.com, without noting the change in the - VLDB. -
% vos zap -server fs6.abc.com -partition f -id 536870988 - --
Privilege Required -
The issuer must be listed in the /usr/afs/etc/UserList file on - the machine specified with the -server argument and on each - database server machine. If the -localauth flag is included, - the issuer must instead be logged on to a server machine as the local - superuser root. -
Related Information -
vos -
-
- -
-
-
Purpose -
Verifies proper inode configuration -
Synopsis -
xfs_size_check --
Description -
The xfs_size_check command, when run on a file server machine - that runs IRIX version 6.2 or higher and uses XFS-formatted partitions - as server partitions (conventionally mounted at /vicep - directories), verifies that each partition uses 512-byte inodes. AFS - stores information in the inodes on server partitions, and the 256-byte inode - size that XFS uses by default is not large enough. -
Cautions -
This command is available on in the AFS distribution for IRIX system types - that can use XFS-formatted partitions as server partitions. -
Output -
If all server partitions are properly configured, the command produces no - output. Otherwise, it prints the following header: -
Need to remake the following partitions: - --
and then the following message for each partition on which to run the IRIX - mkfs command with the indicated options: -
device: mkfs -t xfs -i size=512 -l size=4000b device - --
where device is in a format like /dev/dsk/dks0d0s0 for - a single disk partition or /dev/xlv/xlv0 for a logical - volume. -
Privilege Required -
The issuer must be logged in as the local superuser root. -
-
- -
-
-
Purpose -
Displays data collections from the Cache Manager -
Synopsis -
xstat_cm_test [initcmd] -cmname <Cache Manager name(s) to monitor>+ - -collID <Collection(s) to fetch>+ [-onceonly] - [-frequency <poll frequency, in seconds>] - [-period <data collection time, in minutes>] [-debug] [-help] - - xstat_cm_test [i] -cm <Cache Manager name(s) to monitor>+ - -co <Collection(s) to fetch>+ [-o] - [-f <poll frequency, in seconds>] - [-p <data collection time, in minutes>] [-d] [-h] --
Description -
The xstat_cm_test command tests the routines in the - libxstat_cm.a library and displays the data collections - associated with the Cache Manager. The command executes in the - foreground. -
The command produces a large volume of output; to save it for later - analysis, direct it to a file. -
Options -
There are three acceptable values: -
Related Information -
-
- -
-
-
Purpose -
Displays data collections from the File Server process -
Synopsis -
xstat_fs_test [initcmd] -fsname <File Server name(s) to monitor>+ - -collID <Collection(s) to fetch>+ [-onceonly] - [-frequency <poll frequency, in seconds>] - [-period <data collection time, in minutes>] [-debug] [-help] - - xstat_fs_test [initcmd] -fs <File Server name(s) to monitor>+ - -c <Collection(s) to fetch>+ [-o] - [-fr <poll frequency, in seconds>] - [-p <data collection time, in minutes>] [-d] [-h] --
Description -
The xstat_fs_test command tests the routines in the - libxstat_fs.a library and displays the data collections - associated with the File Server (the fs process). The - command executes in the foreground. -
The command produces a large volume of output; to save it for later - analysis, direct it to a file. -
Options -
There are three acceptable values: -
Related Information -
- -
-
-
- -
If the machine's kernel supports NFS server functionality:
# cp bin/libafs.o /usr/sys/BINARY/afs.mod!
If the machine's kernel does not support NFS server ! functionality:
# cp bin/libafs.nonfs.o /usr/sys/BINARY/afs.mod --- 597,609 ----
If the machine's kernel supports NFS server functionality and is to be ! used as an NFS translator:
# cp bin/libafs.o /usr/sys/BINARY/afs.mod!
If the machine's kernel does not support NFS server functionality ! or is not to be used as an NFS translator:
# cp bin/libafs.nonfs.o /usr/sys/BINARY/afs.mod *************** *** 823,834 ****
If the machine's kernel supports NFS server functionality:
# cp bin/libafs.a /usr/conf/lib!
If the machine's kernel does not support NFS server functionality, ! change the file's name as you copy it:
# cp bin/libafs.nonfs.a /usr/conf/lib/libafs.a --- 824,837 ----
If the machine's kernel supports NFS server functionality and is to be ! used as an NFS translator:
# cp bin/libafs.a /usr/conf/lib!
If the machine's kernel does not support NFS server functionality ! or is not to be used as an NFS translator, change the file's name as ! you copy it:
# cp bin/libafs.nonfs.a /usr/conf/lib/libafs.a *************** *** 1205,1222 **** IPxx portion of the library file name must match the value previously returned by the uname -m command. Also choose the file appropriate to whether the machine's kernel supports NFS server ! functionality (NFS must be supported for the machine to act as an NFS/AFS Translator). Single- and multiprocessor machines use the same library file.(You can choose to copy all of the kernel library files into the /usr/vice/etc/sgiload directory, but they require a significant amount of space.) !
If the machine's kernel supports NFS server functionality:
# cp -p usr/vice/etc/sgiload/libafs.IPxx.o /usr/vice/etc/sgiload!If the machine's kernel does not support NFS server ! functionality:
# cp -p usr/vice/etc/sgiload/libafs.IPxx.nonfs.o \ /usr/vice/etc/sgiload --- 1208,1227 ---- IPxx portion of the library file name must match the value previously returned by the uname -m command. Also choose the file appropriate to whether the machine's kernel supports NFS server ! functionality and is to be used as an NFS translator (NFS must be ! supported for the machine to act as an NFS/AFS Translator). Single- and multiprocessor machines use the same library file.(You can choose to copy all of the kernel library files into the /usr/vice/etc/sgiload directory, but they require a significant amount of space.) !
If the machine's kernel supports NFS server functionality and is to be ! used as an NFS translator:
# cp -p usr/vice/etc/sgiload/libafs.IPxx.o /usr/vice/etc/sgiload!If the machine's kernel does not support NFS server functionality ! or is not to be used as an NFS translator:
# cp -p usr/vice/etc/sgiload/libafs.IPxx.nonfs.o \ /usr/vice/etc/sgiload *************** *** 1266,1280 **** /var/sysgen/boot/afs.a; the IPxx portion of the library file name must match the value previously returned by the uname -m command. Also choose the file appropriate to ! whether the machine's kernel supports NFS server functionality (NFS must ! be supported for the machine to act as an NFS/AFS Translator). Single- and multiprocessor machines use the same library file. !If the machine's kernel supports NFS server functionality:
# cp -p bin/libafs.IPxx.a /var/sysgen/boot/afs.a!If the machine's kernel does not support NFS server ! functionality:
# cp -p bin/libafs.IPxx.nonfs.a /var/sysgen/boot/afs.a --- 1271,1287 ---- /var/sysgen/boot/afs.a; the IPxx portion of the library file name must match the value previously returned by the uname -m command. Also choose the file appropriate to ! whether the machine's kernel supports NFS server functionality and is ! to be used as an NFS translator (NFS must be supported for the machine ! to act as an NFS/AFS Translator). Single- and multiprocessor machines use the same library file. !If the machine's kernel supports NFS server functionality and is to be ! used as an NFS translator:
# cp -p bin/libafs.IPxx.a /var/sysgen/boot/afs.a!If the machine's kernel does not support NFS server functionality ! or is not to be used as an NFS translator:
# cp -p bin/libafs.IPxx.nonfs.a /var/sysgen/boot/afs.a *************** *** 1686,1711 ****
If the machine is running Solaris 2.6 or the 32-bit version of ! Solaris 7, its kernel supports NFS server functionality, and the ! nfsd process is running:
# cp -p modload/libafs.o /kernel/fs/afs
If the machine is running Solaris 2.6 or the 32-bit version of ! Solaris 7, and its kernel does not support NFS server functionality or the ! nfsd process is not running:
# cp -p modload/libafs.nonfs.o /kernel/fs/afs
If the machine is running the 64-bit version of Solaris 7, its kernel ! supports NFS server functionality, and the nfsd process is running:
# cp -p modload/libafs64.o /kernel/fs/sparcv9/afs
If the machine is running the 64-bit version of Solaris 7, and its ! kernel does not support NFS server functionality or the nfsd ! process is not running:
# cp -p modload/libafs64.nonfs.o /kernel/fs/sparcv9/afs --- 1693,1717 ----
If the machine is running Solaris 2.6 or the 32-bit version of ! Solaris 7, its kernel supports NFS server functionality and is to be ! used as an NFS translator, and the nfsd process is running:
# cp -p modload/libafs.o /kernel/fs/afs
If the machine is running Solaris 2.6 or the 32-bit version of ! Solaris 7, and its kernel does not support NFS server functionality, is ! not to be used as an NFS translator, or the nfsd process is not running:
# cp -p modload/libafs.nonfs.o /kernel/fs/afs
If the machine is running the 64-bit version of Solaris 7, its kernel ! supports NFS server functionality and is to be used as an NFS translator, and the nfsd process is running:
# cp -p modload/libafs64.o /kernel/fs/sparcv9/afs
If the machine is running the 64-bit version of Solaris 7, and its ! kernel does not support NFS server functionality, is not to be used as an NFS translator or the nfsd process is not running:
# cp -p modload/libafs64.nonfs.o /kernel/fs/sparcv9/afs Index: openafs/doc/man-pages/README diff -c openafs/doc/man-pages/README:1.4.2.27 openafs/doc/man-pages/README:1.4.2.32 *** openafs/doc/man-pages/README:1.4.2.27 Tue Apr 1 02:59:11 2008 --- openafs/doc/man-pages/README Mon Jun 30 16:09:40 2008 *************** *** 107,115 **** own copyright and a statement that the man page is released under the IBM Public License Version 1.0, or under some other license that is sufficiently compatible that we can use your work. If you use another ! license and that license isn't "public domain," you have to give the ! full license text in the man page; please don't use a license so long ! that this is annoying. The SYNOPSIS section should start with the full command name and the full names of all options, and then have a second section showing the --- 107,116 ---- own copyright and a statement that the man page is released under the IBM Public License Version 1.0, or under some other license that is sufficiently compatible that we can use your work. If you use another ! license and that license isn't "public domain" or one of the ones ! already listed in our LICENSE file, you have to give the full license ! text in the man page; please don't use a license so long that this is ! annoying. The SYNOPSIS section should start with the full command name and the full names of all options, and then have a second section showing the *************** *** 147,152 **** --- 148,182 ---- surrounding the variable. For consistency in formatting, references to those variables should be formatted the same in following text. + Man Page Sections + + The section of a man page is determined by which directory it's in. + pod1 will be section 1 man pages, pod5 will be section 5, and pod8 will + be section 8. + + The breakdown between section 1 and section 8 is fuzzy and it's hard to + get right. The current layout balances the following goals: + + * In general, section 1 is used for commands that can be executed by any + user and section 8 is used for commands that can only be meaningfully + issued as root. If a command can be run with AFS privileged + credentials but still as a regular user on the local system, the + preference is for it to be in section 1, although some pages of that + type are in section 8. + + * All the commands for a given suite should be kept together. So, for + example, there are fs commands that can only be issued as root, but + since most of the suite is available to any user, all of the fs + commands are in section 1. + + * The sections of the man pages should roughly correspond to the + installation paths of the binaries. Binaries installed in bin should + have man pages in section 1 and binaries installed in sbin should have + man pages in section 8. + + Section 5 should be used for all documentation of configuration files + and file formats. + How You Can Help The OpenAFS man page project is just starting, and a lot of work remains *************** *** 201,220 **** * The following installed commands have no man pages: copyauth fs cscpolicy fs memdump fs monitor fs rxstatpeer fs rxstatproc fs setcbaddr restorevol rmtsysd ! vldb_convert ! vos clone vos setfields vsys * klog.krb, pagsh.krb, and tokens.krb need to be listed as alternative names in the NAME line of the non-.krb man pages, links should be installed on man page installation, and the behavior of pagsh.krb --- 231,257 ---- * The following installed commands have no man pages: + compile_et.afs copyauth fs cscpolicy + fs getfid fs memdump fs monitor fs rxstatpeer fs rxstatproc fs setcbaddr + fs trace + klog.krb + krb.conf + pagsh.krb restorevol rmtsysd ! tokens.krb vos setfields vsys + * Add -noresolve to the documentation of all the vos commands. + * klog.krb, pagsh.krb, and tokens.krb need to be listed as alternative names in the NAME line of the non-.krb man pages, links should be installed on man page installation, and the behavior of pagsh.krb *************** *** 229,237 **** * bos addkey should be marked deprecated in favor of using asetkey with a keytab. - * I'm fairly sure that the fileserver man page no longer documents all - of the fileserver options. - * The package man page should probably mention the (pointless) package apropos and package help commands, or they could be removed. There used to be separate man pages for them, but that seemed rather --- 266,271 ---- Index: openafs/doc/man-pages/generate-html diff -c openafs/doc/man-pages/generate-html:1.1.4.3 openafs/doc/man-pages/generate-html:1.1.4.7 *** openafs/doc/man-pages/generate-html:1.1.4.3 Tue Feb 28 18:48:45 2006 --- openafs/doc/man-pages/generate-html Sun Jul 13 22:30:55 2008 *************** *** 7,12 **** --- 7,34 ---- use Pod::Simple::Search; @ISA = qw(Pod::Simple::HTML); + # Add a link back to the index page to the top and bottom of each generated + # page. + # + # The hideous approach we have to use is because, unless we create a + # Pod::Simple::HTML object and then rebless it, the html_header_after_title + # and html_footer subs are placed in the OpenAFS::HTML package. That means we + # can't override them in a subclass and still call the SUPER version since + # we'll be overwriting the SUPER version, and there aren't other good + # opportunities to change the default values that I can see. + sub new { + my $class = shift; + my $self = Pod::Simple::HTML->new (@_); + bless ($self, 'OpenAFS::HTML'); + my $link = '' . "\n"; + my $after = $self->html_header_after_title; + $self->html_header_after_title ($after . $link); + my $end = $self->html_footer; + $self->html_footer ($link . $end); + return $self; + } + sub do_man_link { my ($self, $token) = @_; my $page = $token->attr ('to'); *************** *** 37,42 **** --- 59,82 ---- $Pod::Simple::HTML::Tagmap{'item-number'} = '
'; $Pod::Simple::HTML::Tagmap{'/item-number'} = '